Reverse engineering, vulnerability assessment, and hardening for Android applications

Request Audit 24–72h turnaround

Case Studies

FINTECH

Payment Infrastructure Audit

Client-side subscription validation bypass. Hardcoded billing API keys in BuildConfig. Missing Play Integrity verification allowing unrestricted sideloading.

Subscription Bypass · API Key Exposure · License Check
AI ASSISTANT

ML Platform Security Review

Unauthenticated gRPC endpoints exposing user data. Misconfigured Supabase RLS policies. JWT tokens with 10-year lifetimes hardcoded in client code.

Auth Bypass · Data Exposure · Token Security
EDTECH

Learning App Penetration Test

Trial period trivially bypassed via app data clearing. Firebase Remote Config flag granting universal premium access. Zero anti-tamper or root detection.

Trial Bypass · Remote Config · Anti-Tamper

What You Get

A structured security audit report covering: application architecture analysis, SDK and third-party service enumeration, authentication and authorization review, subscription and payment flow security, hardcoded secrets inventory, proof-of-concept smali patches with runtime verification, and a prioritized remediation roadmap.

View Sample Report →

Process

01

Intake

You send the APK or XAPK bundle. We define scope, threat model, and timeline together.

02

Decompilation & Analysis

Full reverse engineering — smali disassembly, Java decompilation, manifest analysis, SDK and service enumeration.

03

Exploitation & Patching

Proof-of-concept patches applied and verified on emulator. Real attack vectors demonstrated with runtime logs.

04

Report & Remediation

Detailed findings with severity ratings, prioritized fixes, and architecture-level recommendations delivered.

Terminal

saltykov.tech — terminal
OPERATIONAL RESPONSE: <24H @issaltykov