In this post, I explain how to get an APK from your phone/emulator and use JADX to pseudo decompile it.
This is a pretty easy retired HackTheBox machine that you should try out! It has a straight forward exploitation path.
In this post, I explain a Design Pattern used to implement Inversion of Control, namely Dependency Injection.
In this post I discuss some ideas I've had and captured from my little experience in this hard topic.
This is a somewhat easy/a bit intermediate machine perfect to practice a certain OWASP Top 10 vulnerability. Try it out yourself!
Machine link: https://www.vulnhub.com/entry/temple-of-doom-1,243/