Build a custom Kernel for Reverse Engineering

Deploying a kernel that abuses this trust, and unabashedly lies about itself and the environment, goes a long way in defeating most reversing defenses that malware authors (or normal developers) can throw at you.

==The steps below work on Ubuntu 14.04 with Android NDK 4.8. ==

Hooking Android System Calls for Pleasure and Benefit

Show Comments