Exploring Marauder, Bruce, and Ghost ESP on Cheap Yellow Device
https://www.mobile-hacker.com/2024/12/23/exploring-marauder-bruce-and-ghost-esp-on-cheap-yellow-device/
https://www.mobile-hacker.com/2024/12/23/exploring-marauder-bruce-and-ghost-esp-on-cheap-yellow-device/
Mobile Hacker
Exploring Marauder, Bruce, and Ghost ESP on Cheap Yellow Display
In this blog, I will focus on the most popular offensive security projects such as Marauder, Bruce and Ghost ESP to get most of this device and compare them in the end.
👍13🔥8
Android BADBOX Botnet Is Back
https://www.bitsight.com/blog/badbox-botnet-back
https://www.bitsight.com/blog/badbox-botnet-back
Bitsight
BADBOX Botnet Is Back | Bitsight
The TRACE team investigated BADBOX, which is a large-scale cybercriminal operation selling off-brand Android TV boxes, smartphones, and other Android electronics with preinstalled malware.
👍16🔥5😁2
Install and run any firmware (Marauder, Bruce, Ghost ESP...) on ESP32 devices without using computer with M5Stick Launcher
https://www.mobile-hacker.com/2024/12/29/run-firmware-anywhere-flexibility-of-m5stick-launcher/
https://www.mobile-hacker.com/2024/12/29/run-firmware-anywhere-flexibility-of-m5stick-launcher/
Mobile Hacker
Run Firmware Anywhere: Flexibility of M5Stick Launcher
Launcher tool that is able to switch between all of the three firmware without a need of a computer, and even while on the go.
👍15🌚2
This media is not supported in your browser
VIEW IN TELEGRAM
How to install and run any firmware (Marauder, Bruce, Ghost ESP...) on ESP32 devices without using computer with M5Stick Launcher
https://www.mobile-hacker.com/2024/12/29/run-firmware-anywhere-flexibility-of-m5stick-launcher/
https://www.mobile-hacker.com/2024/12/29/run-firmware-anywhere-flexibility-of-m5stick-launcher/
🔥21👍4❤1
Ultimate iOS (iPhone & iPad) Hardening Guide
https://github.com/martinholovsky/Security-Blueprints/blob/main/iOS-Hardening-Guide.md
https://github.com/martinholovsky/Security-Blueprints/blob/main/iOS-Hardening-Guide.md
GitHub
Security-Blueprints/iOS-Hardening-Guide.md at main · martinholovsky/Security-Blueprints
Collection of my Security Blueprints & Guides. Contribute to martinholovsky/Security-Blueprints development by creating an account on GitHub.
👍12🔥5🤡3
FireScam: Android information stealing malware with spyware capabilities
https://www.cyfirma.com/research/inside-firescam-an-information-stealer-with-spyware-capabilities/
https://www.cyfirma.com/research/inside-firescam-an-information-stealer-with-spyware-capabilities/
CYFIRMA
Inside FireScam : An Information Stealer with Spyware Capabilities - CYFIRMA
This report has been revised to remove references to the obfuscation tool previously mentioned, as the obfuscation techniques in the...
🌚12👍6❤1
Emulating Android native libraries using unidbg
https://bhamza.me/blogpost/2024/09/10/Emulating-Android-native-libraries-using-unidbg.html
https://bhamza.me/blogpost/2024/09/10/Emulating-Android-native-libraries-using-unidbg.html
Hamza’s blog posts, notes and thoughts.
Emulating Android native libraries using unidbg
Introduction Unidbg is an open-source framework to emulate Android native libraries (and to a certain extent has experimental iOS emulation capabilities). There are a few use cases where emulating Android libraries is beneficial. I will cover a single use…
🔥11🌚4👍3👏3
Unidbg to production
https://bhamza.me/blogpost/2024/09/20/unidbg-to-production.html
https://bhamza.me/blogpost/2024/09/20/unidbg-to-production.html
Hamza’s blog posts, notes and thoughts.
Unidbg to production
Introduction In the last blogpost, we covered how to use unidbg from scratch to emulate an Android native library. As some might have noticed, the Proof of Concept code is not production ready as it does not allow for a way to call the signing functionality…
👍11🔥6🌚1
Boost Flipper Zero with FEBERIS: 3-in-1 SubGhz, NRF24, and WiFi board
https://www.mobile-hacker.com/2025/01/09/boost-your-flipper-zero-with-feberis-3-in-1-subghz-nrf24-and-wifi-board/
https://www.mobile-hacker.com/2025/01/09/boost-your-flipper-zero-with-feberis-3-in-1-subghz-nrf24-and-wifi-board/
Mobile Hacker
Boost Your Flipper Zero with FEBERIS: 3-in-1 SubGhz, NRF24, and WiFi board
I am excited to introduce you to FEBERIS, an expansion 3-in-1 development board for the Flipper Zero. This custom board utilizes external Wi-Fi, NRF24, and CC1101 modules, enhancing the capabilities of your Flipper Zero device.
👍17❤12👌2
Fully-remote (0-click) bug on the Samsung S24 if Google Messages is configured for RCS (the default configuration on this device), as the trannoscription service decodes incoming audio before a user interacts with the message for trannoscription purposes. Issue is fixed now.
https://project-zero.issues.chromium.org/issues/368695689
https://project-zero.issues.chromium.org/issues/368695689
🔥34👍3⚡1
Analysis of Autel MaxiCharger Android app to reviewing the attack surface
https://www.zerodayinitiative.com/blog/2025/1/15/reviewing-the-attack-surface-of-the-autel-maxicharger-part-two
https://www.zerodayinitiative.com/blog/2025/1/15/reviewing-the-attack-surface-of-the-autel-maxicharger-part-two
Zero Day Initiative
Zero Day Initiative — Reviewing the Attack Surface of the Autel MaxiCharger: Part Two
Previously , we covered the internals of the Autel MaxiCharger where we highlighted each of the main components. In this post, we aim to outline the attack surface of the MaxiCharger in the hopes of providing inspiration for vulnerability research. All information…
🌚7👍1
Android malware in DoNot APT operations
https://www.cyfirma.com/research/android-malware-in-donot-apt-operations/
https://www.cyfirma.com/research/android-malware-in-donot-apt-operations/
CYFIRMA
ANDROID MALWARE IN DONOT APT OPERATIONS - CYFIRMA
EXECUTIVE SUMMARY The research team at CYFIRMA collected a sample attributed to the Indian APT group known as ‘DONOT’, which...
❤12🌚6🤔2👍1
USB Army Knife: Close Access Penetest Tool
It is capable of: remote keystroke injection, VNC, USB network adapter, EvilAP, Marauder, record microphone, controlled over web interface with fancy LCD screen
https://www.mobile-hacker.com/2025/01/24/usb-army-knife-the-ultimate-close-access-penetest-tool/
It is capable of: remote keystroke injection, VNC, USB network adapter, EvilAP, Marauder, record microphone, controlled over web interface with fancy LCD screen
https://www.mobile-hacker.com/2025/01/24/usb-army-knife-the-ultimate-close-access-penetest-tool/
Mobile Hacker
USB Army Knife: The Ultimate Close Access Penetest Tool
Whether you want to transform into a USB Ethernet adapter and capture network traffic, create custom user interface for your attacks, or use covert storage devices, the USB Army Knife has you covered.
👍29🔥3👏2
Vulnerability of hotel room Android kiosk tablets
It was possible to execute ADB commands, unlock bootloader and possibly escalate privileges to root. Pull kiosk apps for reverse engineering and obtain servers (pivot) or hardcoded secrets.
As a result attacker could pose as another guest room terminal and control the air conditioning and lights, place orders, display bills, and eavesdrop on chats
https://devblog.lac.co.jp/entry/20250124
It was possible to execute ADB commands, unlock bootloader and possibly escalate privileges to root. Pull kiosk apps for reverse engineering and obtain servers (pivot) or hardcoded secrets.
As a result attacker could pose as another guest room terminal and control the air conditioning and lights, place orders, display bills, and eavesdrop on chats
https://devblog.lac.co.jp/entry/20250124
ラック・セキュリティごった煮ブログ
高級ホテルの客室タブレットに潜む危険:他客室も操作、盗聴可能だった脆弱性を発見するまで - ラック・セキュリティごった煮ブログ
しゅーとです。 新婚旅行で沖縄に行ってきたのですが、そこで泊まった高級リゾートホテルの客室にタブレットが置いてありました。 このタブレットを調査したところ、客室内の盗聴・盗撮が可能となる脆弱性や、第三者がネットワーク上から他客室のコントロール、チャットの盗聴が可能となる脆弱性を発見しました。この問題はIPAを通して開発…
👍11🔥5😁2🌚2
Analysis of TrickMo Android malware campaign targeting Poland
https://www.sirt.pl/atak-na-uzytkownikow-androida-falszywa-aplikacja-olx/
https://www.sirt.pl/atak-na-uzytkownikow-androida-falszywa-aplikacja-olx/
PREBYTES Security Incident Response Team
Atak na użytkowników Androida - Fałszywa aplikacja OLX
W ostatnich tygodniach użytkownicy OLX padli ofiarą nowej złośliwej aplikacji, która podszywa się pod popularną platformę ogłoszeniową. Atak malware wykorzystuje metodę phishingu, mając na celu kradzież danych osobowych i środków finansowych. Jak działa ta…
❤8👍2🔥2😁2🌚1
Android Tria stealer: malware that exfiltrates data and hijack accounts
https://securelist.com/tria-stealer-collects-sms-data-from-android-devices/115295/
https://securelist.com/tria-stealer-collects-sms-data-from-android-devices/115295/
Securelist
Tria stealer targets Android users for SMS exfiltration and financial gain
Kaspersky GReAT experts discovered a new campaign targeting Android devices in Malaysia and Brunei with the Tria stealer to collect data from apps like WhatsApp and Gmail.
👍8🌚3🔥2❤1😁1
Understanding WiFi Karma attacks or how and why devices can auto-reconnect to untrusted networks
https://www.mobile-hacker.com/2025/02/05/hacking-on-the-go-wi-fi-karma-attacks-with-mobile-devices/
https://www.mobile-hacker.com/2025/02/05/hacking-on-the-go-wi-fi-karma-attacks-with-mobile-devices/
Mobile Hacker
Hacking on the Go: Wi-Fi Karma Attacks with Mobile Devices
Being automatically reconnected to known Wi-Fi networks is a convenience that comes with security risks, one of them being the Wi-Fi Karma Attack. Cybercriminals can use this method to trick unsuspecting users into automatically connecting to rogue Wi-Fi…
👍16😱3❤2🌚2🗿2
SparkCat malware: OCR crypto stealers in Google Play and App Store
https://securelist.com/sparkcat-stealer-in-app-store-and-google-play/115385/
https://securelist.com/sparkcat-stealer-in-app-store-and-google-play/115385/
Securelist
SparkCat crypto stealer in Google Play and App Store
Kaspersky experts discover iOS and Android apps infected with the SparkCat crypto stealer in Google Play and the App Store. It steals crypto wallet data using an OCR model.
🔥13👍6🌚1
Mobile Indian Cyber Heist: FatBoyPanel And His Massive Data Breach
https://www.zimperium.com/blog/mobile-indian-cyber-heist-fatboypanel-and-his-massive-data-breach/
https://www.zimperium.com/blog/mobile-indian-cyber-heist-fatboypanel-and-his-massive-data-breach/
Zimperium
Mobile Indian Cyber Heist: FatBoyPanel And His Massive Data Breach
true
🌚6👎2🥱2😴1
Frida noscript to bypass root detection & SSL certificate pinning
https://github.com/0xCD4/SSL-bypass
https://github.com/0xCD4/SSL-bypass
GitHub
GitHub - 0xCD4/SSL-bypass: SSL bypass check
SSL bypass check. Contribute to 0xCD4/SSL-bypass development by creating an account on GitHub.
👏9❤2👍2