Tilden SwansAndroid Quickie: TrustedWallet ImpersonationWho they are impersonating:2 min read·Nov 10, 2020----
Tilden SwansUsing what we built (APK Analysis)In a previous post I made some recommendations for a base build of an Android Analysis VM…let’s put it to work3 min read·Sep 21, 2020----
Tilden SwansLet’s build an Android Analysis VMNote: when a lot of people first get into Android sample analysis, they go overboard, and end up overwhelming themselves with a lot of…6 min read·Sep 19, 2020----
Tilden SwansCom-pany-pro_fili_ng (U-S) 101Note: this doesn’t go into full passive or active reconnaissance looking for publicly available data, potentials for phish context, etc —…5 min read·Aug 21, 2020----
Tilden SwansAPK Quickie: MediaPlayer.apkFile Name: MediaPlayer.apk Size: 1.46MB MD5: 4751e8fc217645c0debe01fc426a195d SHA1: 96dda778f85ec20c9f8a9dccb4979059c7d9c6bd SHA256…2 min read·Jun 23, 2020----
Tilden SwansAPK: Impersonating SecurePlusMD5: f2d4985291b4682eaa2a3435101904fd SHA-1: 9e4a2c9536bc90d99f87b089b23be3b012920898 SHA-256…3 min read·Jun 11, 2020----
Tilden SwansMalware Traffic AnalysisI’ve been meaning to get around to doing one of these in a public blog for a bit, so I figured I would pick one of the more involved…13 min read·Jun 1, 2020----
Tilden SwansProfiling Applications using ShodanShodan, along with BinaryEdge and Censys are services that allow researchers to query against data collected via various means (crawlers…4 min read·May 26, 2020----