From 331f3a99cd67db4c38752329904dddc909305978 Mon Sep 17 00:00:00 2001 From: Translator Date: Thu, 4 Sep 2025 09:17:17 +0000 Subject: [PATCH] Fix unmatched refs --- .../basic-forensic-methodology/malware-analysis.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/src/generic-methodologies-and-resources/basic-forensic-methodology/malware-analysis.md b/src/generic-methodologies-and-resources/basic-forensic-methodology/malware-analysis.md index 20274276a..c7a170f31 100644 --- a/src/generic-methodologies-and-resources/basic-forensic-methodology/malware-analysis.md +++ b/src/generic-methodologies-and-resources/basic-forensic-methodology/malware-analysis.md @@ -160,7 +160,7 @@ On Android, you can instrument native code inside the target app process by prel See the Android native reversing page for setup details and log paths: {{#ref}} -../../../mobile-pentesting/android-app-pentesting/reversing-native-libraries.md +../../mobile-pentesting/android-app-pentesting/reversing-native-libraries.md {{#endref}} ---