The Book
18 chapters — threat landscape, injection techniques, full engagements, advanced evasion, and defense.
The Book
18 chapters — threat landscape, injection techniques, full engagements, advanced evasion, and defense.
The Labs
14 hands-on exercises with real APKs, self-check scripts, and concrete deliverables.
Materials Kit
Target APKs, payload configs (GPS, sensors, frames), and automation scripts.
Quick Reference
Every command, payload format, and troubleshooting tip on one page.
Recon — Decode the APK, map every hookable surface
Patch — Instrument the bytecode with the patch-tool
Configure — Push payloads (frames, GPS configs, sensor profiles)
Execute — Run the target flow with all injection subsystems active
Report — Capture evidence, compute statistics, write findings
You’ll learn each phase independently, then combine them in full engagements against multi-step verification flows.
This repo ships two knowledge files that give any AI coding agent — Cursor, Windsurf, Cline, GitHub Copilot, Aider, or any LLM — the methodology for authorized Android security assessments. Load them and the agent can decode, patch, verify, and diagnose like a practitioner. See Chapter 4 for setup.
Penetration testers, security engineers, and developers working on authorized assessments of Android identity verification systems.
No prior reverse engineering experience required — Part I covers the foundations.