Intermediate guide - How to use MVT to conduct the analysis of a mobile device and its backup imageJanuary 1, 1 by Esther Onfroy6 minutes
Advanced guide - How to use PiRogue to intercept the TLS traffic of a mobile appJanuary 1, 1 by Esther Onfroy11 minutes
Advanced guide - How to use Colander to analyze the network traffic of an appJanuary 1, 1 by Esther Onfroy17 minutes
Advanced guide - Mobile application regulatory compliance audit methodologyJanuary 1, 1 by Esther Onfroy10 minutes