From d4f6ef7aa0bc474d02b47fa8f79c90ce94c60990 Mon Sep 17 00:00:00 2001 From: nbats Date: Sat, 3 Feb 2024 22:24:35 +0000 Subject: [PATCH] =?UTF-8?q?=E2=99=BB=EF=B8=8F=20update=20single=20page?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- single-page | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/single-page b/single-page index aaf69194f..fd3b0dc39 100644 --- a/single-page +++ b/single-page @@ -10912,7 +10912,6 @@ outline: false * [Hacksplaining](https://www.hacksplaining.com/) - Developer Security Lessons * [sha256_project](https://github.com/oconnor663/sha256_project) - Applied Cryptography Course * [John Hammond](https://www.youtube.com/@_JohnHammond) or [LowLevelLearning](https://www.youtube.com/@LowLevelLearning/) - Cybersecurity YouTube Tutorials -* [ClassyShark](https://github.com/google/android-classyshark) - Android/Java Bytecode Viewer *** @@ -11561,6 +11560,7 @@ outline: false * [MobileApp-Pentest-Cheatsheet](https://github.com/tanprathan/MobileApp-Pentest-Cheatsheet) - App Pentesting Cheatsheet * [Radare](https://rada.re/r/), [Reverse Engineer's Toolkit](https://github.com/mentebinaria/retoolkit), [Rizin](https://rizin.re/), [Frida](https://frida.re/), [GHIDRA](https://ghidra-sre.org/) or [Cutter](https://github.com/rizinorg/cutter) - Reverse Engineering * [MSTG](https://github.com/OWASP/owasp-mastg) or [DVIA-v2](https://github.com/prateek147/DVIA-v2) - App Security Testing / Reverse Engineering +* [ClassyShark](https://github.com/google/android-classyshark) - Android/Java Bytecode Viewer * [challenges.re](https://challenges.re/) - Reverse Engineer Code * [YASNAC](https://github.com/RikkaW/YASNAC) - SafetyNet Attestation Checker * [AllSafe](https://github.com/t0thkr1s/allsafe) - Intentionally Vulnerable Android App