luject - a static injector of dynamic library for application
https://github.com/lanoox/luject
https://github.com/lanoox/luject
GitHub
GitHub - hack0z/luject: 🍹A static injector of dynamic library for application (android, iphoneos, macOS, windows, linux)
🍹A static injector of dynamic library for application (android, iphoneos, macOS, windows, linux) - hack0z/luject
Android App Reverse Engineering - Part 1
https://youtu.be/BijZmutY0CQ
https://youtu.be/BijZmutY0CQ
YouTube
Android App Reverse Engineering LIVE! - Part 1
Live stream of teaching Part 1 of the Android App Reverse Engineering workshop on 24 April 2020 by Maddie Stone (@maddiestone). Workshop is available at https://maddiestone.github.io/AndroidAppRE
Donation Link for SF-Marin Foodbank: https://us-p2p.netdo…
Donation Link for SF-Marin Foodbank: https://us-p2p.netdo…
Lucy’s Back: Ransomware Goes Mobile
https://research.checkpoint.com/2020/lucys-back-ransomware-goes-mobile/
https://research.checkpoint.com/2020/lucys-back-ransomware-goes-mobile/
Check Point Research
Lucy’s Back: Ransomware Goes Mobile - Check Point Research
Research by: Ohad Mana, Aviran Hazum, Bogdan Melnykov, Liav Kuperman Overview Ransomware attacks have been a part of the security landscape for a long time. We are familiar with infamous malware such as CryptoLocker, WannaCry and Ryuk, all of which have caused…
👍1
PhantomLance campaign analysis
https://securelist.com/apt-phantomlance/96772/
https://securelist.com/apt-phantomlance/96772/
Securelist
Hiding in plain sight: PhantomLance walks into a market
In July 2019, a sophisticated backdoor trojan in Google Play was reported. We conducted an inquiry of our own, discovering a long-term campaign, which we dubbed “PhantomLance”.
How to hook Android Native methods with Frida (Noob Friendly)
https://erev0s.com/blog/how-hook-android-native-methods-frida-noob-friendly/
https://erev0s.com/blog/how-hook-android-native-methods-frida-noob-friendly/
Erev0S
How to hook Android Native methods with Frida (Noob Friendly)
Hooking C/C++ code in Android application using Frida with introduction and explainations in every step - noob friendly
Android IPC: Part 1 - Introduction
https://blog.hacktivesecurity.com/index.php?controller=post&action=view&id_post=46
https://blog.hacktivesecurity.com/index.php?controller=post&action=view&id_post=46
Android IPC: Part 2 - Binder and Service Manager Perspective
https://blog.hacktivesecurity.com/index.php?controller=post&action=view&id_post=48
https://blog.hacktivesecurity.com/index.php?controller=post&action=view&id_post=48
Cerberus distributed over company's MDM server
https://research.checkpoint.com/2020/first-seen-in-the-wild-mobile-as-attack-vector-using-mdm/
https://research.checkpoint.com/2020/first-seen-in-the-wild-mobile-as-attack-vector-using-mdm/
Check Point Research
First seen in the wild - Malware uses Corporate MDM as attack vector - Check Point Research
Research by: Aviran Hazum, Bogdan Melnykov, Chana Efrati, Danil Golubenko, Israel Wernik, Liav Kuperman, Ohad Mana Overview: Check Point researchers discovered a new Cerberus variant which is targeting a multinational conglomerate, and is distributed by the…
EventBot: A Android Banking Trojan analysis
https://www.cybereason.com/blog/eventbot-a-new-mobile-banking-trojan-is-born
https://www.cybereason.com/blog/eventbot-a-new-mobile-banking-trojan-is-born
Cybereason
EventBot: A New Mobile Banking Trojan is Born
The Cybereason Nocturnus team is investigating EventBot, a new type of Android mobile malware. EventBot abuses accessibility features to steal user data from financial applications, read user SMS messages, and steal SMS messages to allow the malware to bypass…
Forwarded from The Bug Bounty Hunter
Stealing your SMS messages with iOS 0day
https://wojciechregula.blog/post/stealing-your-sms-messages-with-ios-0day/
https://wojciechregula.blog/post/stealing-your-sms-messages-with-ios-0day/
wojciechregula.blog
Stealing your SMS messages with iOS 0day
This is a special post because I fully based on another researcher, s1guza’s 0day. All of this story began from the following tweet:
Siguza told us that his 0day was patched in the iOS 13.5 beta3. So this is actually a sandbox escape 0day for the newest,…
Siguza told us that his 0day was patched in the iOS 13.5 beta3. So this is actually a sandbox escape 0day for the newest,…
Popular Android malware threats - April, 2020
http://skptr.me/malware_timeline_2020.html
Samples: https://github.com/sk3ptre/AndroidMalware_2020
http://skptr.me/malware_timeline_2020.html
Samples: https://github.com/sk3ptre/AndroidMalware_2020
GitHub
GitHub - sk3ptre/AndroidMalware_2020: Popular Android malware seen in 2020
Popular Android malware seen in 2020. Contribute to sk3ptre/AndroidMalware_2020 development by creating an account on GitHub.
Xiaomi Recording Millions Of People’s ‘Private’ Web And Phone Use
https://www.forbes.com/sites/thomasbrewster/2020/04/30/exclusive-warning-over-chinese-mobile-giant-xiaomi-recording-millions-of-peoples-private-web-and-phone-use
https://www.forbes.com/sites/thomasbrewster/2020/04/30/exclusive-warning-over-chinese-mobile-giant-xiaomi-recording-millions-of-peoples-private-web-and-phone-use
Forbes
Exclusive: Warning Over Chinese Mobile Giant Xiaomi Recording Millions Of People’s ‘Private’ Web And Phone Use
Xiaomi is collecting users’ browser habits and phone usage, raising red flags for privacy researchers.
Forwarded from The Bug Bounty Hunter
AndroPyTool
A framework for automated extraction of static and dynamic features from Android applications
https://github.com/alexMyG/AndroPyTool#how-to-install
A framework for automated extraction of static and dynamic features from Android applications
https://github.com/alexMyG/AndroPyTool#how-to-install
GitHub
GitHub - alexMyG/AndroPyTool: A framework for automated extraction of static and dynamic features from Android applications
A framework for automated extraction of static and dynamic features from Android applications - alexMyG/AndroPyTool
Reverse engineering Flutter apps
Build process of Flutter applications and explain in detail how to reverse engineer the code
https://blog.tst.sh/reverse-engineering-flutter-apps-part-1/
Build process of Flutter applications and explain in detail how to reverse engineer the code
https://blog.tst.sh/reverse-engineering-flutter-apps-part-1/
ping's blog
Reverse engineering Flutter apps (Part 1)
Chapter 1: Down the rabbit hole
To start this journey I'll cover some backstory on the Flutter stack and how it works.
What you probably already know: Flutter was built from the ground up with its own render pipeline and widget library, allowing it to…
To start this journey I'll cover some backstory on the Flutter stack and how it works.
What you probably already know: Flutter was built from the ground up with its own render pipeline and widget library, allowing it to…
List of iOS applications related to COVID-19 with capabilities and permissions they request
https://github.com/ivRodriguezCA/Covid19-Mobile-Apps
https://github.com/ivRodriguezCA/Covid19-Mobile-Apps
GitHub
GitHub - ivRodriguezCA/Covid19-Mobile-Apps: List of the most popular COVID10 mobile applications and the permissions they request.
List of the most popular COVID10 mobile applications and the permissions they request. - GitHub - ivRodriguezCA/Covid19-Mobile-Apps: List of the most popular COVID10 mobile applications and the per...
Forwarded from The Bug Bounty Hunter
Android Application Penetration Testing / Bug Bounty Checklist
https://blog.softwaroid.com/2020/05/02/android-application-penetration-testing-bug-bounty-checklist/
https://blog.softwaroid.com/2020/05/02/android-application-penetration-testing-bug-bounty-checklist/
Hacking/OSCP cheatsheet
https://ceso.github.io/posts/2020/04/hacking/oscp-cheatsheet/
https://ceso.github.io/posts/2020/04/hacking/oscp-cheatsheet/
30 Reverse Engineering Tips & Tricks
https://blog.vastart.dev/2020/04/guys-30-reverse-engineering-tips-tricks.html
https://blog.vastart.dev/2020/04/guys-30-reverse-engineering-tips-tricks.html
👍1
Cheatsheets for all vulnerabilities
https://github.com/OWASP/CheatSheetSeries/tree/master/cheatsheets
https://github.com/OWASP/CheatSheetSeries/tree/master/cheatsheets
GitHub
CheatSheetSeries/cheatsheets at master · OWASP/CheatSheetSeries
The OWASP Cheat Sheet Series was created to provide a concise collection of high value information on specific application security topics. - OWASP/CheatSheetSeries
Android SLocker uses Coronavirus scare to lock smartphones
https://labs.bitdefender.com/2020/05/android-slocker-variant-uses-coronavirus-scare-to-take-android-hostage/
https://labs.bitdefender.com/2020/05/android-slocker-variant-uses-coronavirus-scare-to-take-android-hostage/
Bitdefender Labs
Android SLocker Variant Uses Coronavirus Scare to Take Android Hostage
The coronavirus pandemic is an opportunity for criminals who try to take advantage of people’s thirst for information. Unfortunately, Android users can fall prey to... #android #covid19 #ransomware