Summary
Being able to reverse engineer an application and understand (as well as modify) its internal working is a great superpower to have. We discussed how mobile applications are developed, the basics of reverse engineering mobile applications, how reverse engineering can be useful during security assessment, as well as malware analysis, and how to automate some parts of reverse engineering.
The path to learning does not stop here, as this is just the start of what is possible with reverse engineering. With this, I will end this book here, and I hope you all will have a lot of fun reverse engineering mobile applications to find and fix security issues.