Explore

Mobile Security

Securing iOS and Android applications.

More in Mobile Security

How Attackers Hack Mobile Devices - Real Scenarios

How Attackers Actually Hack Mobile Devices: Real Scenarios and Defenses

Mobile App Internals - Lifecycle, Instant App, IPC & Instance Call

Mobile App Internals: Lifecycle, Instant App, IPC & Instance Call

OWASP Top 10 Mobile- 2024

OWASP Mobile Top 10 Risks: 2024 Edition

iOS Sideloading with Xcode

iOS Sideloading with Xcode: A Practical Guide for Mobile Pentesters

Bypassing the Client-Side Authentication Mechanism

Mobile App Penetration Testing: Local Data Storage & Extraction

Frida

Advanced Frida Scripting: Controlling App Internals and Data Extraction

Obfuscation

A Smokescreen in the Code: Obfuscation and the Art of Lifting the Veil

Bypass pinning by repackaging - Android

Mastering SSL Pinning Bypass: From Package Repackaging to Automated Tools

Certificate Pinning

What is Certificate Pinning?

Rooting & Jailbreak

The Art of Breaking System Locks: Everything About Rooting and Jailbreaking

Android Key Store & iOS Keychain

Fort Knox on Your Phone: Understanding & Pentesting Android KeyStore and iOS Keychain

The Anatomy of Mobile App

The Anatomy of Mobile App and Penetration Testing

Mobile Platform Security

Mobile Platform Security: A Comparative Analysis of iOS and Android Strategies

Types of Mobile App

The three main approaches to mobile application development are Native, Cross-Platform, and Hybrid apps. Each method has its unique characteristics,...

Mobile Code Signing

Mobile Code Signing: Why Your App’s Signature Is a Security Boundary

OWASP Top 10 Mobile- 2017

OWASP Top 10 Mobile Risks: A Complete Guide