<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/">
  <channel>
    <title>Reverse Engineering on b3nsh4</title>
    <link>https://b3nsh4.com/tags/reverse-engineering/</link>
    <description>Recent content in Reverse Engineering on b3nsh4</description>
    <generator>Hugo -- 0.157.0</generator>
    <language>en-us</language>
    <lastBuildDate>Thu, 02 Apr 2026 17:10:17 +0530</lastBuildDate>
    <atom:link href="https://b3nsh4.com/tags/reverse-engineering/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>How I patched an Android app to download encrypted HLS streams as MP4</title>
      <link>https://b3nsh4.com/blog/2026/blog-hls-apk-extraction/</link>
      <pubDate>Thu, 02 Apr 2026 17:10:17 +0530</pubDate>
      <guid>https://b3nsh4.com/blog/2026/blog-hls-apk-extraction/</guid>
      <description>&lt;p&gt;I patched an Android app — decompiled it, injected code, recompiled — to pull its encrypted HLS video streams out as plain &lt;code&gt;.mp4&lt;/code&gt; files. This is how that worked.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Note:&lt;/strong&gt; This article is intended solely for educational and reading purposes. I will not disclose the app&amp;rsquo;s name or any information that could identify or impact the original application.&lt;/p&gt;
&lt;p&gt;I still remember, back in 2015 or 16, i used Sandroproxy &lt;a href=&#34;https://www.androidauthority.com/sandroproxy-app-review-103907/&#34; rel=&#34;noopener&#34; target=&#34;_blank&#34;&gt;Sandroproxy android app&lt;/a&gt;
 to intercept traffic of android apps to basically download resources/video/stream links. It was so cool!&lt;/p&gt;</description>
    </item>
  </channel>
</rss>
