Explore
Mobile Security
Securing iOS and Android applications.
More in Mobile Security
How Attackers Hack Mobile Devices - Real Scenarios
How Attackers Actually Hack Mobile Devices: Real Scenarios and Defenses
Mobile App Internals - Lifecycle, Instant App, IPC & Instance Call
Mobile App Internals: Lifecycle, Instant App, IPC & Instance Call
OWASP Top 10 Mobile- 2024
OWASP Mobile Top 10 Risks: 2024 Edition
iOS Sideloading with Xcode
iOS Sideloading with Xcode: A Practical Guide for Mobile Pentesters
Bypassing the Client-Side Authentication Mechanism
Mobile App Penetration Testing: Local Data Storage & Extraction
Frida
Advanced Frida Scripting: Controlling App Internals and Data Extraction
Obfuscation
A Smokescreen in the Code: Obfuscation and the Art of Lifting the Veil
Bypass pinning by repackaging - Android
Mastering SSL Pinning Bypass: From Package Repackaging to Automated Tools
Certificate Pinning
What is Certificate Pinning?
Rooting & Jailbreak
The Art of Breaking System Locks: Everything About Rooting and Jailbreaking
Android Key Store & iOS Keychain
Fort Knox on Your Phone: Understanding & Pentesting Android KeyStore and iOS Keychain
The Anatomy of Mobile App
The Anatomy of Mobile App and Penetration Testing
Mobile Platform Security
Mobile Platform Security: A Comparative Analysis of iOS and Android Strategies
Types of Mobile App
The three main approaches to mobile application development are Native, Cross-Platform, and Hybrid apps. Each method has its unique characteristics,...
Mobile Code Signing
Mobile Code Signing: Why Your App’s Signature Is a Security Boundary
OWASP Top 10 Mobile- 2017
OWASP Top 10 Mobile Risks: A Complete Guide