Ollama LLM with jadx for APK analysis
https://github.com/zinja-coder/zin-mcp-client
https://github.com/zinja-coder/zin-mcp-client
GitHub
GitHub - zinja-coder/zin-mcp-client: MCP Client which serves as bridge between mcp servers and local LLMs running on Ollama, Created…
MCP Client which serves as bridge between mcp servers and local LLMs running on Ollama, Created for MCP Servers Developed by Me, However other MCP Servers may run as well - zinja-coder/zin-mcp-client
🔥15👍4❤1👏1🌚1
Advanced Anti-Forensic Protection of Mobile Applications
https://www.researchgate.net/publication/375258345_Advanced_Anti-Forensic_Protection_of_Mobile_Applications
https://www.researchgate.net/publication/375258345_Advanced_Anti-Forensic_Protection_of_Mobile_Applications
ResearchGate
(PDF) Advanced Anti-Forensic Protection of Mobile Applications
PDF | Abstract—A mobile device is usually the carrier of its owner's sensitive data, but it also contains a lot of system data that reveals the... | Find, read and cite all the research you need on ResearchGate
❤13👍2🔥1🌚1
The Human Interface Device (HID) Attack on Android Lock Screen Non-Biometric Protections and Its Computational Complexity
https://www.researchgate.net/publication/361992079_The_Human_Interface_Device_HID_Attack_on_Android_Lock_Screen_Non-Biometric_Protections_and_Its_Computational_Complexity
https://www.researchgate.net/publication/361992079_The_Human_Interface_Device_HID_Attack_on_Android_Lock_Screen_Non-Biometric_Protections_and_Its_Computational_Complexity
ResearchGate
(PDF) The Human Interface Device (HID) Attack on Android Lock Screen Non-Biometric Protections and Its Computational Complexity
PDF | Nowadays, information obtained from mobile phones is often the subject of evidence in front of a court. ForensicNowadays, information obtained... | Find, read and cite all the research you need on ResearchGate
❤8👍1🌚1
The Human Interface Device Attack from the Perspective of the Attacker and the Forensic Analyst
https://www.researchgate.net/publication/365110681_The_Human_Interface_Device_Attack_from_the_Perspective_of_the_Attacker_and_the_Forensic_Analyst
https://www.researchgate.net/publication/365110681_The_Human_Interface_Device_Attack_from_the_Perspective_of_the_Attacker_and_the_Forensic_Analyst
ResearchGate
(PDF) The Human Interface Device Attack from the Perspective of the Attacker and the Forensic Analyst
PDF | Abstract—The main prerequisite to extract data from asmartphone or exploit the device is to bypass its lock screenprotection. The Human Interface... | Find, read and cite all the research you need on ResearchGate
❤7🌚1
KALEIDOSCOPE: Evolution of Ad Fraud Exploiting App Stores as a Front
https://go.integralads.com/rs/469-VBI-606/images/AMER_Threat_Lab_Kaleidoscope_Report_IAS.pdf
https://go.integralads.com/rs/469-VBI-606/images/AMER_Threat_Lab_Kaleidoscope_Report_IAS.pdf
🌚5
HacknDroid: Automation of some MAPT activities and interaction with the mobile Android device
Prerequisites:
adb enabled ✅
device authorized ✅
https://github.com/RaffaDNDM/HacknDroid
Prerequisites:
adb enabled ✅
device authorized ✅
https://github.com/RaffaDNDM/HacknDroid
🌚11👏4👍3🔥3
WireWatch, a large-scale measurement pipeline to evaluate the network security of Android apps. WireWatch measures apps' usage of plaintext network traffic and non-standard, proprietary network cryptography.
https://www.computer.org/csdl/proceedings-article/sp/2025/223600d916/26hiVQjbZqE
https://www.computer.org/csdl/proceedings-article/sp/2025/223600d916/26hiVQjbZqE
🌚8👍2👏1
PAPIMonitor: python tool based on Frida for monitoring user-select APIs during the app execution
https://github.com/Dado1513/PAPIMonitor
https://github.com/Dado1513/PAPIMonitor
GitHub
GitHub - 0xdad0/PAPIMonitor: Python API Monitor for Android apps
Python API Monitor for Android apps. Contribute to 0xdad0/PAPIMonitor development by creating an account on GitHub.
❤13👍4🔥2🌚2
Advanced Protection: Google’s Strongest Security for Mobile Devices
https://security.googleblog.com/2025/05/advanced-protection-mobile-devices.html
https://security.googleblog.com/2025/05/advanced-protection-mobile-devices.html
Google Online Security Blog
Advanced Protection: Google’s Strongest Security for Mobile Devices
Posted by Il-Sung Lee, Group Product Manager, Android Security Protecting users who need heightened security has been a long-standing com...
🤣11💩5🌚2👍1
Hacking My Car, and probably yours— Security Flaws in Volkswagen’s App
https://loopsec.medium.com/hacking-my-car-and-probably-yours-security-flaws-in-volkswagens-app-24b34c47ba89
https://loopsec.medium.com/hacking-my-car-and-probably-yours-security-flaws-in-volkswagens-app-24b34c47ba89
Medium
Hacking My Car, and probably yours— Security Flaws in Volkswagen’s App
This flaw made me the owner of thousands of cars (sort of).
👍14❤4👏3👎1🌚1
I was playing around with new and smaller HackRF PortaPack H4M
In a summary blog, you can find what's new with H4M, how to flash it, copy necessary data, and a couple of use-cases.
https://www.mobile-hacker.com/2025/05/19/hackrf-portapack-h4m-with-mayhem-firmware-a-powerful-handheld-sdr-toolkit/
In a summary blog, you can find what's new with H4M, how to flash it, copy necessary data, and a couple of use-cases.
https://www.mobile-hacker.com/2025/05/19/hackrf-portapack-h4m-with-mayhem-firmware-a-powerful-handheld-sdr-toolkit/
Mobile Hacker
HackRF PortaPack H4M with Mayhem Firmware – A Powerful Handheld SDR Toolkit
In the Q4 of 2024, a new SDR (Software Defined Radio) was released: the HackRF PortaPack H4M, shipping with the Mayhem firmware. Whether you’re a hobbyist, hacker, ham radio enthusiast, or security researcher, this compact device brings a full-featured radio…
👍8👏2
Coding Without a Laptop - Two Weeks with AR Glasses and Linux on Android
https://holdtherobot.com/blog/2025/05/11/linux-on-android-with-ar-glasses/
https://holdtherobot.com/blog/2025/05/11/linux-on-android-with-ar-glasses/
Holdtherobot
Coding Without a Laptop - Two Weeks with AR Glasses and Linux on Android | Hold The Robot
I recently learned something that blew my mind;
👍9🔥2👏2❤1
O2 VoLTE: locating any customer with a phone call
https://mastdatabase.co.uk/blog/2025/05/o2-expose-customer-location-call-4g/
https://mastdatabase.co.uk/blog/2025/05/o2-expose-customer-location-call-4g/
mastdatabase.co.uk
O2 VoLTE: locating any customer with a phone call
Privacy is dead: For multiple months, any O2 customer has had their location exposed to call initiators without their knowledge.
🌚9👍6
The State of iOS Jailbreaking in 2025
[slides] https://github.com/alfiecg24/Presentations/blob/main/The%20State%20of%20iOS%20Jailbreaking%20in%202025.pdf
[slides] https://github.com/alfiecg24/Presentations/blob/main/The%20State%20of%20iOS%20Jailbreaking%20in%202025.pdf
GitHub
Presentations/The State of iOS Jailbreaking in 2025.pdf at main · alfiecg24/Presentations
Contribute to alfiecg24/Presentations development by creating an account on GitHub.
🌚6❤1
This Video Can Exploit Your iPhone (CVE-2025-31200)
https://youtu.be/nTO3TRBW00E
https://youtu.be/nTO3TRBW00E
YouTube
This Video Can Exploit Your iPhone (CVE-2025-31200 #1)
Are you a security researcher or reverse engineer?
For 50% off IDA Products use promo code BILLY50, https://hex-rays.com/pricing *
For 30% off IDA Training use promo code BILLY30, https://hex-rays.com/training **
*License discounts are only valid for individuals…
For 50% off IDA Products use promo code BILLY50, https://hex-rays.com/pricing *
For 30% off IDA Training use promo code BILLY30, https://hex-rays.com/training **
*License discounts are only valid for individuals…
👍15🔥7❤4👎1🌚1
Bypassing MTE with CVE-2025-0072
https://github.blog/security/vulnerability-research/bypassing-mte-with-cve-2025-0072/
Exploit: https://github.com/github/securitylab/tree/main/SecurityExploits/Android/Mali/CVE-2025-0072
https://github.blog/security/vulnerability-research/bypassing-mte-with-cve-2025-0072/
Exploit: https://github.com/github/securitylab/tree/main/SecurityExploits/Android/Mali/CVE-2025-0072
The GitHub Blog
Bypassing MTE with CVE-2025-0072
See how a vulnerability in the Arm Mali GPU can be exploited to gain kernel code execution even when Memory Tagging Extension (MTE) is enabled.
❤11🌚1
Emulating a Bike Sensor
https://eybisi.run/Emulating-a-Bike-Sensor/
https://eybisi.run/Emulating-a-Bike-Sensor/
hedgehog's cave
Emulating a Bike Sensor
As a reverse engineer and someone who enjoys dissecting how systems communicate, my interest was recently piqued by the Bluetooth Low Energy (BLE) cycling sensors that integrate with fitness tracking
🌚6❤2👍2🔥1
A strict iOS app that analyzes link safety like a nutrition label (no AI, offline)
https://github.com/sigfault-byte/LegitURL
https://github.com/sigfault-byte/LegitURL
GitHub
GitHub - sigfault-byte/LegitURL: A strict iOS app that analyzes link safety like a nutrition label (no AI, offline)
A strict iOS app that analyzes link safety like a nutrition label (no AI, offline) - sigfault-byte/LegitURL
🌚6
Boost your Android threat detection capabilities 🤖
Modern mobile threats require dynamic tools for dynamic threats. With ANY.RUN’s Interactive Sandbox now supports Android, you can:
✅ Instantly detect threats with interactive analysis
✅ Understand APK behavior with fast access to threat details
✅ Extract IOCs and generate detailed reports in seconds
🎁 Special offer: Get extra Sandbox licenses to level up your mobile threat hunting.
Hurry up to get #ANYRUN birthday deals, ending May 31 👉 here is the link.
Modern mobile threats require dynamic tools for dynamic threats. With ANY.RUN’s Interactive Sandbox now supports Android, you can:
✅ Instantly detect threats with interactive analysis
✅ Understand APK behavior with fast access to threat details
✅ Extract IOCs and generate detailed reports in seconds
🎁 Special offer: Get extra Sandbox licenses to level up your mobile threat hunting.
Hurry up to get #ANYRUN birthday deals, ending May 31 👉 here is the link.
❤13🔥2👍1
Analysis of GhostSpy Android RAT: Advanced Persistent RAT with Stealthy Remote Control and Uninstall Resistance
https://www.cyfirma.com/research/ghostspy-web-based-android-rat-advanced-persistent-rat-with-stealthy-remote-control-and-uninstall-resistance/
https://www.cyfirma.com/research/ghostspy-web-based-android-rat-advanced-persistent-rat-with-stealthy-remote-control-and-uninstall-resistance/
CYFIRMA
GhostSpy Web-Based Android RAT : Advanced Persistent RAT with Stealthy Remote Control and Uninstall Resistance - CYFIRMA
EXECUTIVE SUMMARY At CYFIRMA, we are committed to delivering timely intelligence on emerging threats and attacker tactics. In this report,...
👍10🌚2❤1
Zanubis: Tracing the active evolution of the Android banking malware
https://securelist.com/evolution-of-zanubis-banking-trojan-for-android/116588/
https://securelist.com/evolution-of-zanubis-banking-trojan-for-android/116588/
Securelist
Evolution of Zanubis, a banking Trojan for Android
A comprehensive historical breakdown of Zanubis' changes, including RC4 and AES encryption, credentials stealing and new targets in Peru, provided by Kaspersky GReAT experts.
🌚6💩3👎1🥱1