Explore

Mobile Security

Securing iOS and Android applications.

More in Mobile Security

Bypassing the Client-Side Authentication Mechanism

Mobile App Penetration Testing: The Anatomy of Local Data Storage & Runtime Extraction on Android & iOS

OWASP Top 10 Mobile- 2024

OWASP Mobile Top 10 - 2024

OWASP Top 10 Mobile- 2017

Hidden Dangers of Mobile Security: A Complete Guide to the Top 10 Risks M1: Improper Platform Usage

Binary Protection

우리 손안의 전쟁터: 모바일 바이너리 보호 기술과 우회 전략

Frida

1. Advanced Frida Scripting: Controlling App Internals and Data Extraction

Obfuscation

A Smokescreen in the Code: Obfuscation and the Art of Lifting the Veil

Bypass pinning by repackaging - Android

Mastering SSL Pinning Bypass: From Package Repackaging to Automated Tools

Certificate Pinning

What is Certificate Pinning?

Rooting & Jailbreak

The Art of Breaking System Locks: Everything About Rooting and Jailbreaking

Android Key Store & iOS Keychain

Fort Knox on Your Phone: Understanding & Pentesting Android KeyStore and iOS Keychain

The Anatomy of Mobile App

The Anatomy of Mobile App and Penetration Testing Common Types of Sensitive Information to Look For

Mobile Platform Security

Mobile Platform Security: A Comparative Analysis of iOS and Android Strategies

Types of Mobile App

The three main approaches to mobile application development are Native, Cross-Platform, and Hybrid apps. Each method has its unique characteristics,...

Android Pentesting Note

Android Penetration Testing Notes