macOS .App Surgery: How to Reverse, Patch, and Re-signHow a macOS app works behind the scenes? In this guide, we’ll open one up, make a few changes, and put it back together.Aug 15A response icon1Aug 15A response icon1
Handling Split APKs and Intercepting Network Traffic Without SSL Pinning BypassEffortlessly Debug and Intercept Traffic in Android Apps: A Guide to Handling Split APKs and Bypassing SSL Pinning ChallengesJan 27A response icon1Jan 27A response icon1
My Experience completing eMAPT CertificationRandom aesthetic cover — from NotionApr 15, 2024Apr 15, 2024
Buffer-overflow in Android native code — MobileHackingLab ‘Notekeeper’ Write-upExploiting a Buffer-overflow bug in a native library function in an Android App to gain code execution.Jan 31, 2024A response icon1Jan 31, 2024A response icon1
De-serialization vulnerability in 3rd Party Library to RCE — MobileHackingLab(Android) ‘Config…Exploiting De-serialization vulnerability in a 3rd party Android library leading to RCE.Jan 17, 2024Jan 17, 2024
XSS & Command Injection in Android — MobileHackingLab ‘Post Board’ write-upA lab that covers XSS in a WebView within Android which could be exploited by other apps in the device, combined with a Command Injection…Jan 16, 2024A response icon2Jan 16, 2024A response icon2
Insecure Content Provider in Android — MobileHackingLab ‘Secure Notes’ Write-upThe challenge from MobileHackingLab is a good one for practising the exploitation of an insecure Content Provider.Jan 16, 2024Jan 16, 2024
Path traversal to RCE in Android — Mobile Hacking Lab ‘Document Viewer’ write-upDuring my preparation for eMAPT, I came across Mobile Hacking Lab — and their free hacking labs which I felt would help me for practice…Dec 28, 2023A response icon1Dec 28, 2023A response icon1