From 26e453f4577ec17d5a9c13c1184b1611b5415067 Mon Sep 17 00:00:00 2001 From: nbats <44333466+nbats@users.noreply.github.com> Date: Sat, 3 Feb 2024 14:24:23 -0800 Subject: [PATCH] Update DEVTools.md --- DEVTools.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/DEVTools.md b/DEVTools.md index b960e9edc..f8c210b44 100644 --- a/DEVTools.md +++ b/DEVTools.md @@ -246,7 +246,6 @@ * [Hacksplaining](https://www.hacksplaining.com/) - Developer Security Lessons * [sha256_project](https://github.com/oconnor663/sha256_project) - Applied Cryptography Course * [John Hammond](https://www.youtube.com/@_JohnHammond) or [LowLevelLearning](https://www.youtube.com/@LowLevelLearning/) - Cybersecurity YouTube Tutorials -* [ClassyShark](https://github.com/google/android-classyshark) - Android/Java Bytecode Viewer *** @@ -895,6 +894,7 @@ * [MobileApp-Pentest-Cheatsheet](https://github.com/tanprathan/MobileApp-Pentest-Cheatsheet) - App Pentesting Cheatsheet * [Radare](https://rada.re/r/), [Reverse Engineer's Toolkit](https://github.com/mentebinaria/retoolkit), [Rizin](https://rizin.re/), [Frida](https://frida.re/), [GHIDRA](https://ghidra-sre.org/) or [Cutter](https://github.com/rizinorg/cutter) - Reverse Engineering * [MSTG](https://github.com/OWASP/owasp-mastg) or [DVIA-v2](https://github.com/prateek147/DVIA-v2) - App Security Testing / Reverse Engineering +* [ClassyShark](https://github.com/google/android-classyshark) - Android/Java Bytecode Viewer * [challenges.re](https://challenges.re/) - Reverse Engineer Code * [YASNAC](https://github.com/RikkaW/YASNAC) - SafetyNet Attestation Checker * [AllSafe](https://github.com/t0thkr1s/allsafe) - Intentionally Vulnerable Android App