SkillAgentSearch skills...

ReverseEngineeringAndroidMalware

This contains notes and slides for my talk on Reverse Engineering Android Malware

Install / Use

/learn @LaurieWired/ReverseEngineeringAndroidMalware
About this skill

Quality Score

0/100

Supported Platforms

Universal

README

<div align="center"> <img width="512" height="288" alt="spynote" src="https://github.com/user-attachments/assets/f2d9e72a-2cd6-4e1f-9f04-fc14e86aab64" />

GitHub stars GitHub forks GitHub contributors Follow @lauriewired on Twitter

</div>

Reverse Engineering Android Malware

During this talk, I introduce the flow of malware analysis from the discovery to the reverse engineering phase. I show how to reverse engineer malicious Android applications and even look at a case study of the notorious SpyNote malware. Together we locate the malicious C2 server hidden inside of the Android application's resources.

Bonus Challenge

Caution, this is real malware

Can you find the malicious C2 server inside this similar SpyNote sample?

Hint! It may be encoded

Related Skills

View on GitHub
GitHub Stars66
CategoryDevelopment
Updated12h ago
Forks5

Security Score

80/100

Audited on Mar 26, 2026

No findings