diff --git a/src/generic-methodologies-and-resources/basic-forensic-methodology/malware-analysis.md b/src/generic-methodologies-and-resources/basic-forensic-methodology/malware-analysis.md index a3e8a6df7..ef424ea2e 100644 --- a/src/generic-methodologies-and-resources/basic-forensic-methodology/malware-analysis.md +++ b/src/generic-methodologies-and-resources/basic-forensic-methodology/malware-analysis.md @@ -160,7 +160,7 @@ Sur Android, vous pouvez instrumenter du code natif à l'intérieur du processus See the Android native reversing page for setup details and log paths: {{#ref}} -../../../mobile-pentesting/android-app-pentesting/reversing-native-libraries.md +../../mobile-pentesting/android-app-pentesting/reversing-native-libraries.md {{#endref}} ---