Size: 533 MB

Description

This course introduces students to Offensive Java/Android Programming. Students will learn how to write an Android Application that gives a reverse shell from scratch. This course teaches you two different ways to write a reverse connection trojan for Android Platform – The first way is to write the trojan by packaging a netcat binary into an Android Application and the second way is by only using Java APIs. The code is tested against the latest versions of Android Operating System. You will learn interesting programming techniques. Having the ability to write your own payloads can also help you in bypassing anti virus softwares when needed. This is an intermediate to Advanced level course, but if you are a beginner with passion to learn Offensive Programming, you can still take this course. If you are a penetration tester or a security professional in general, this course is for you.

Who this course is for:

  • Penetration Testers
  • Android Developers
  • Security professionals who are interested in internals of security tools
  • Red Team members
  • Anyone who is interested in hacking and offensive programming

What you’ll learn

  • Learn how to write your own reverse connection trojan in two different ways
  • Learn how automated tools generate reverse shell payloads
  • Learn Offensive Android Programming from scratch
  • Learn how to use existing tools such netcat within an Android app
  • Learn the fundamentals of Developing Android Apps
  • Learn how powerful Java native APIs are when writing offensive programs

HOMEPAGE – https://www.udemy.com/course/write-an-android-trojan-from-scratch/

Download Links-

Note: Comment below if you find any link dead or getting problem in downloading files.

You May Also Like

eLearnSecurity – Penetration Testing Student
Social Media Marketing 2020 – Growth Through Collaboration
LEE’s Web Hacking (SQL-injection AND SECURE-CODING Skills)

1 Comment

dz · August 28, 2020 at 6:31 am

Hi, The both zippyshare links seems corrupted with crc error.

Leave a Reply

Your email address will not be published. Required fields are marked *