Android reverse-engineering & hacking

Android reverse-engineering & hacking

Tired of not knowing what information is gathered by your mobile apps? Want to tweak the behavior of a closed source app? In this talk we will show you how to audit and hack the functionality of closed source Android apps using reverse engineering.


This talk will explain and demonstrate:

  • How Android apps are constructed
  • How to use the Android Debug Bridge (ADB)
  • Disassembly - DEX to Smali
  • Manifest and Smali auditing and hacking


This will be a fast-paced technical talk and basic understanding of Java or similar programming languages will help.



The slides from the talk are now available for download.


Magnus has spent the last 25 years building software for the Internet and has a strong interest in privacy, security and all things connected. He has been developing kernel drivers, web apps and everything in between including his own TCP/IP implementation, a complete VPN-server/client with MITM-credential injection and a NAT-traversing P2P connection library used by millions of clients. He is one of the founders and main organizers of 0xFF.


17.30-18.00 Pre-event mingle and snacks
18.00-19.00 Presentation
19.00-20.00 Post-event mingle

Code of Conduct

Please read our Code of Conduct before attending the event.

When and where

When: May 9th, 2019, 17.30 (door closes at 18.00)

Where: Regeringsg. 30, Stockholm. Follow the 0xFF-signs, 4th floor, “Convendum”. OpenStreetMap


The event is free of charge but the number of seats are limited.

Registration is now closed.