diff --git a/src/generic-methodologies-and-resources/basic-forensic-methodology/malware-analysis.md b/src/generic-methodologies-and-resources/basic-forensic-methodology/malware-analysis.md index 83d6b79fd..0e231830b 100644 --- a/src/generic-methodologies-and-resources/basic-forensic-methodology/malware-analysis.md +++ b/src/generic-methodologies-and-resources/basic-forensic-methodology/malware-analysis.md @@ -160,7 +160,7 @@ On Android, você pode instrumentar código nativo dentro do processo do app alv See the Android native reversing page for setup details and log paths: {{#ref}} -../../../mobile-pentesting/android-app-pentesting/reversing-native-libraries.md +../../mobile-pentesting/android-app-pentesting/reversing-native-libraries.md {{#endref}} ---