Explore
Mobile Security
Securing iOS and Android applications.
More in Mobile Security
Bypassing the Client-Side Authentication Mechanism
Mobile App Penetration Testing: The Anatomy of Local Data Storage & Runtime Extraction on Android & iOS
OWASP Top 10 Mobile- 2024
OWASP Mobile Top 10 - 2024
OWASP Top 10 Mobile- 2017
Hidden Dangers of Mobile Security: A Complete Guide to the Top 10 Risks M1: Improper Platform Usage
Binary Protection
우리 손안의 전쟁터: 모바일 바이너리 보호 기술과 우회 전략
Frida
1. Advanced Frida Scripting: Controlling App Internals and Data Extraction
Obfuscation
A Smokescreen in the Code: Obfuscation and the Art of Lifting the Veil
Bypass pinning by repackaging - Android
Mastering SSL Pinning Bypass: From Package Repackaging to Automated Tools
Certificate Pinning
What is Certificate Pinning?
Rooting & Jailbreak
The Art of Breaking System Locks: Everything About Rooting and Jailbreaking
Android Key Store & iOS Keychain
Fort Knox on Your Phone: Understanding & Pentesting Android KeyStore and iOS Keychain
The Anatomy of Mobile App
The Anatomy of Mobile App and Penetration Testing Common Types of Sensitive Information to Look For
Mobile Platform Security
Mobile Platform Security: A Comparative Analysis of iOS and Android Strategies
Types of Mobile App
The three main approaches to mobile application development are Native, Cross-Platform, and Hybrid apps. Each method has its unique characteristics,...
Android Pentesting Note
Android Penetration Testing Notes