The State of iOS Jailbreaking in 2025
[slides] https://github.com/alfiecg24/Presentations/blob/main/The%20State%20of%20iOS%20Jailbreaking%20in%202025.pdf
[slides] https://github.com/alfiecg24/Presentations/blob/main/The%20State%20of%20iOS%20Jailbreaking%20in%202025.pdf
GitHub
Presentations/The State of iOS Jailbreaking in 2025.pdf at main · alfiecg24/Presentations
Contribute to alfiecg24/Presentations development by creating an account on GitHub.
🌚6❤1
This Video Can Exploit Your iPhone (CVE-2025-31200)
https://youtu.be/nTO3TRBW00E
https://youtu.be/nTO3TRBW00E
YouTube
This Video Can Exploit Your iPhone (CVE-2025-31200 #1)
Are you a security researcher or reverse engineer?
For 50% off IDA Products use promo code BILLY50, https://hex-rays.com/pricing *
For 30% off IDA Training use promo code BILLY30, https://hex-rays.com/training **
*License discounts are only valid for individuals…
For 50% off IDA Products use promo code BILLY50, https://hex-rays.com/pricing *
For 30% off IDA Training use promo code BILLY30, https://hex-rays.com/training **
*License discounts are only valid for individuals…
👍15🔥7❤4👎1🌚1
Bypassing MTE with CVE-2025-0072
https://github.blog/security/vulnerability-research/bypassing-mte-with-cve-2025-0072/
Exploit: https://github.com/github/securitylab/tree/main/SecurityExploits/Android/Mali/CVE-2025-0072
https://github.blog/security/vulnerability-research/bypassing-mte-with-cve-2025-0072/
Exploit: https://github.com/github/securitylab/tree/main/SecurityExploits/Android/Mali/CVE-2025-0072
The GitHub Blog
Bypassing MTE with CVE-2025-0072
See how a vulnerability in the Arm Mali GPU can be exploited to gain kernel code execution even when Memory Tagging Extension (MTE) is enabled.
❤11🌚1
Emulating a Bike Sensor
https://eybisi.run/Emulating-a-Bike-Sensor/
https://eybisi.run/Emulating-a-Bike-Sensor/
hedgehog's cave
Emulating a Bike Sensor
As a reverse engineer and someone who enjoys dissecting how systems communicate, my interest was recently piqued by the Bluetooth Low Energy (BLE) cycling sensors that integrate with fitness tracking
🌚6❤2👍2🔥1
A strict iOS app that analyzes link safety like a nutrition label (no AI, offline)
https://github.com/sigfault-byte/LegitURL
https://github.com/sigfault-byte/LegitURL
GitHub
GitHub - sigfault-byte/LegitURL: A strict iOS app that analyzes link safety like a nutrition label (no AI, offline)
A strict iOS app that analyzes link safety like a nutrition label (no AI, offline) - sigfault-byte/LegitURL
🌚6
Boost your Android threat detection capabilities 🤖
Modern mobile threats require dynamic tools for dynamic threats. With ANY.RUN’s Interactive Sandbox now supports Android, you can:
✅ Instantly detect threats with interactive analysis
✅ Understand APK behavior with fast access to threat details
✅ Extract IOCs and generate detailed reports in seconds
🎁 Special offer: Get extra Sandbox licenses to level up your mobile threat hunting.
Hurry up to get #ANYRUN birthday deals, ending May 31 👉 here is the link.
Modern mobile threats require dynamic tools for dynamic threats. With ANY.RUN’s Interactive Sandbox now supports Android, you can:
✅ Instantly detect threats with interactive analysis
✅ Understand APK behavior with fast access to threat details
✅ Extract IOCs and generate detailed reports in seconds
🎁 Special offer: Get extra Sandbox licenses to level up your mobile threat hunting.
Hurry up to get #ANYRUN birthday deals, ending May 31 👉 here is the link.
❤13🔥2👍1
Analysis of GhostSpy Android RAT: Advanced Persistent RAT with Stealthy Remote Control and Uninstall Resistance
https://www.cyfirma.com/research/ghostspy-web-based-android-rat-advanced-persistent-rat-with-stealthy-remote-control-and-uninstall-resistance/
https://www.cyfirma.com/research/ghostspy-web-based-android-rat-advanced-persistent-rat-with-stealthy-remote-control-and-uninstall-resistance/
CYFIRMA
GhostSpy Web-Based Android RAT : Advanced Persistent RAT with Stealthy Remote Control and Uninstall Resistance - CYFIRMA
EXECUTIVE SUMMARY At CYFIRMA, we are committed to delivering timely intelligence on emerging threats and attacker tactics. In this report,...
👍10🌚2❤1
Zanubis: Tracing the active evolution of the Android banking malware
https://securelist.com/evolution-of-zanubis-banking-trojan-for-android/116588/
https://securelist.com/evolution-of-zanubis-banking-trojan-for-android/116588/
Securelist
Evolution of Zanubis, a banking Trojan for Android
A comprehensive historical breakdown of Zanubis' changes, including RC4 and AES encryption, credentials stealing and new targets in Peru, provided by Kaspersky GReAT experts.
🌚6💩3👎1🥱1
How to load unsigned or fake-signed apps on iOS
https://www.pentestpartners.com/security-blog/how-to-load-unsigned-or-fake-signed-apps-on-ios/
https://www.pentestpartners.com/security-blog/how-to-load-unsigned-or-fake-signed-apps-on-ios/
Pen Test Partners
How to load unsigned or fake-signed apps on iOS | Pen Test Partners
TL;DR Introduction In certain circumstances it can be challenging installing client applications for testing. Situations arise where the application could be provided unsigned or requires self-signing. As a result, the application cannot be directly provisioned…
👍6💩5❤1🌚1
Vulnerabilities Found in Preinstalled apps on Android Smartphones
3rd party app installed on a device could misuse vulnerabilities to:
✅perform factory reset of device
✅exfiltrate PIN code
✅inject an arbitrary intent with system-level privileges
https://www.mobile-hacker.com/2025/06/02/security-issues-found-in-android-smartphones/
3rd party app installed on a device could misuse vulnerabilities to:
✅perform factory reset of device
✅exfiltrate PIN code
✅inject an arbitrary intent with system-level privileges
https://www.mobile-hacker.com/2025/06/02/security-issues-found-in-android-smartphones/
Mobile Hacker
Security Issues Found in preinstalled apps on Android Smartphones
Security researchers have uncovered several critical vulnerabilities in applications preloaded on Ulefone and Krüger&Matz Android smartphones. These flaws, reported by CERT Polska and discovered by Szymon Chadam, expose users to significant risks, including…
🤯17❤4🌚3✍1
Reverse Engineer Android Apps for API Keys
https://pwn.guide/free/forensics/re-android
https://pwn.guide/free/forensics/re-android
💩17🤡8👎3❤1🤮1🌚1🌭1🙉1
Analysis of CoreAudio ITW vulnerability (CVE-2025-31200) patched in iOS 18.4.1
https://blog.noahhw.dev/posts/cve-2025-31200/
https://blog.noahhw.dev/posts/cve-2025-31200/
A Strange Blog
CVE 2025 31200
Background On April 16, 2025, Apple released a patch for a bug in CoreAudio which they said was “Actively exploited in the wild.” This flew under the radar a bit. Epsilon’s blog has a great writeup of the other bug that was presumably exploited in this chain:…
❤9
Crocodilus Mobile Malware: Evolving Fast, Going Global
https://www.threatfabric.com/blogs/crocodilus-mobile-malware-evolving-fast-going-global
https://www.threatfabric.com/blogs/crocodilus-mobile-malware-evolving-fast-going-global
ThreatFabric
Crocodilus Mobile Malware: Evolving Fast, Going Global
Discover the latest developments on Crocodilus, a sophisticated Android Trojan targeting banking apps and crypto wallets across the globe.
🌚11🥱3😴2
Android malware trends: Stealthier, easier-to-use
https://intel471.com/blog/android-malware-trends-stealthier-easier-to-use
https://intel471.com/blog/android-malware-trends-stealthier-easier-to-use
❤9🌚2
Covert Web-to-App Tracking via Localhost on Android
A novel tracking method by Meta and Yandex potentially affecting billions of Android users
https://localmess.github.io/
A novel tracking method by Meta and Yandex potentially affecting billions of Android users
https://localmess.github.io/
🌚9
Analysis of Spyware That Helped to Compromise a Syrian Army from Within
Smartphone espionage doesn’t need expensive exploits. Cheap tools like SpyMax with targeted phishing a social engineering can breach even military targets - no 0-days required
https://www.mobile-hacker.com/2025/06/05/analysis-of-spyware-that-helped-to-compromise-a-syrian-army-from-within/
Smartphone espionage doesn’t need expensive exploits. Cheap tools like SpyMax with targeted phishing a social engineering can breach even military targets - no 0-days required
https://www.mobile-hacker.com/2025/06/05/analysis-of-spyware-that-helped-to-compromise-a-syrian-army-from-within/
Mobile Hacker
Analysis of Spyware That Helped to Compromise a Syrian Army from Within
This case demonstrates that effective smartphone espionage doesn't always require expensive zero-day exploits or the development of sophisticated, custom and undetected spyware. Instead, attackers can achieve significant intelligence gains using older, off…
👍11🌚1
Emulating an iPhone in QEMU
Part 1: https://eshard.com/posts/emulating-ios-14-with-qemu
Part 2: https://eshard.com/posts/emulating-ios-14-with-qemu-part2
Part 1: https://eshard.com/posts/emulating-ios-14-with-qemu
Part 2: https://eshard.com/posts/emulating-ios-14-with-qemu-part2
🌚7👍4🤮1
Lightweight Time Travel Analysis with Frida: faster Android emulation
https://eshard.com/posts/frida-tracer-lightweight-time-travel-analysis
https://eshard.com/posts/frida-tracer-lightweight-time-travel-analysis
🌚4❤1
Mobile statistics: IT threat evolution in Q1 2025
https://securelist.com/malware-report-q1-2025-mobile-statistics/116676/
https://securelist.com/malware-report-q1-2025-mobile-statistics/116676/
Securelist
Mobile threat report for Q1 2025
The number of attacks on mobile devices involving malware, adware, or unwanted apps saw a significant increase in the first quarter.
❤6🌚2
Cellebrite to acquire mobile testing firm Corellium in $200 million deal
https://cyberscoop.com/cellebrite-correllium-acquisition-ios-android/
https://cyberscoop.com/cellebrite-correllium-acquisition-ios-android/
CyberScoop
Cellebrite to acquire mobile testing firm Corellium in $200 million deal
Both companies have faced controversy in recent years, primarily for their work in circumventing mobile device security features
❤9💩3🌚3
Solo: A Pixel 6 Pro Story (When one bug is all you need)
https://starlabs.sg/blog/2025/06-solo-a-pixel-6-pro-story-when-one-bug-is-all-you-need/
https://starlabs.sg/blog/2025/06-solo-a-pixel-6-pro-story-when-one-bug-is-all-you-need/
STAR Labs
Solo: A Pixel 6 Pro Story (When one bug is all you need)
During my internship I was tasked to analyze a Mali GPU exploit on Pixel 7/8 devices and adapt it to make it work on another device: the Pixel 6 Pro.
While the exploit process itself is relatively straightforward to reproduce (in theory we just need to find…
While the exploit process itself is relatively straightforward to reproduce (in theory we just need to find…
👍7🌚1