A collection of reverse engineering challenges for learning about the Android operating system and mobile security..
android-crackme-challenge is hosted in the following web site
https://github.com/reoky/android-crackme-challenge
If you think the Android project android-crackme-challenge listed in this page is inappropriate, such as containing malicious code/tools or violating the copyright, please email info at java2s dot com, thanks.
The following table is the detailed list of android-crackme-challenge.
Item | Value |
---|---|
Java File Count | 93 |
Supported screen sizes | [mdpi, xxhdpi, hdpi, xhdpi] |
Activity Count | 10 |
Fragment Count | 50 |
Required Permissions | android.permission.ACCESS_FINE_LOCATION android.permission.INTERNET android.permission.READ_EXTERNAL_STORAGE android.permission.VIBRATE android.permission.WRITE_EXTERNAL_STORAGE |
The license information of android-crackme-challenge is as follows:
MIT License
There are 15 image files in android-crackme-challenge. The names of the image files are listed as follows.
ab_bottom_solid_nebula.9.png ab_solid_nebula.9.png ab_stacked_solid_nebula.9.png ab_transparent_nebula.9.png cab_background_bottom_nebula.9.png cab_background_top_nebula.9.png list_focused_nebula.9.png list_pressed_nebula.9.png menu_dropdown_panel_nebula.9.png progress_primary_nebula.9.png spinner_ab_default_nebula.9.png spinner_ab_disabled_nebula.9.png spinner_ab_focused_nebula.9.png spinner_ab_pressed_nebula.9.png tiny_grid.png
The following screenshort is generated from the image listed above.