OstorlabFlutter Reverse Engineering and Security AnalysisFlutter, developed by Google, is a widely-used cross-platform framework for mobile development that supports web and desktop application.Jun 16, 20231Jun 16, 20231
Kishor balanIt's all about Bypassing Android SSL Pinning and Intercepting Proxy Unaware applications.Hola H3ckers,Nov 27, 20222Nov 27, 20222
InInfoSec Write-upsbyMarco GalettaBypass FreeRASP’s Mobile Security Measures in FlutterIn this post, we will explore how easy is to bypass all freeRASP countermeasures acting on the flutter package executable inside an iOS…Feb 21, 20233Feb 21, 20233
Burcu YARARRecommendations & Review of eMAPTAs can be understood from the title; This article will include my review of the eMAPT certification process and my recommendations based…Mar 22, 2021Mar 22, 2021
AMPentesting Android Applications-Part 2 -Static AnalysisIn this post I am going to detail how to perform static analysis on Android apps received by a developer.May 12, 20221May 12, 20221
1nv3nt0rAndroid Pentesting-Base1Android applications are bundled in a single file of type APK (Android Package).May 1, 2022May 1, 2022
Beratcan GüreşWhat’s Android Activity Lifecycle?TLDR: States of an android app throughout its life and 7 methods that are called when these states changes.Jul 25, 2022Jul 25, 2022
Sindee.DevLack of Code Integrity Checking in Android (Kotlin) — Part 2: Check hash value of KeystoreFor the purpose of VAPT fixing, this article give suggestion on how to implement integrity checking in android development. The purpose of…Jul 15, 2022Jul 15, 2022
Sindee.DevCode Integrity Checking in Android — Part 1 — Check checksum of dex fileFor the purpose of VAPT fixing, this article give suggestion on how to implement integrity checking in android development. The purpose of…Jul 14, 20221Jul 14, 20221
InInfoSec Write-upsbyHacktivitiesHackTheBox Writeup: RouterSpaceThis was an easy-difficulty Linux box that required basic scanning and analysis of an Android APK file to gain a foothold on the machine to…Jul 9, 2022Jul 9, 2022
HacktivitiesPurposefully Insecure and Vulnerable Android Application (PIVAA): Part 2In part 2 of this series, I will attempt to discuss some of the different encryption vulnerabilities present in the “Purposefully Insecure…Jun 17, 2020Jun 17, 2020
HacktivitiesPurposefully Insecure and Vulnerable Android Application (PIVAA) : Part 3This article is part 3 in a series that will cover some of the different vulnerabilities present in the “Purposefully Insecure and…Jun 17, 2020Jun 17, 2020
HacktivitiesPurposefully Insecure and Vulnerable Android Application (PIVAA): Part 1This article is the first part in a series that will cover some of the different vulnerabilities present in the “Purposefully Insecure and…Jun 17, 20201Jun 17, 20201