Forwarded from Android Security & Malware
Automating Android Component Testing with new APK Inspector tool
-What are exported components?
-Setup and testing APK Inspector
-Improve automation and execute ADB commands interactively
-Run it on Android
-What are Intent Redirection Vulnerabilities?
https://www.mobile-hacker.com/2025/09/18/automating-android-app-component-testing-with-new-apk-inspector/
-What are exported components?
-Setup and testing APK Inspector
-Improve automation and execute ADB commands interactively
-Run it on Android
-What are Intent Redirection Vulnerabilities?
https://www.mobile-hacker.com/2025/09/18/automating-android-app-component-testing-with-new-apk-inspector/
Mobile Hacker
Automating Android App Component Testing with New APK Inspector
If improperly secured, exported components become easy entry points for attackers to execute arbitrary code, access sensitive data, or manipulate the appβs behavior.
π₯4
Forwarded from Kal
Good morning, everyone π₯°. Just a reminder, the goal isnβt to compete with anyone else. Itβs to live your best life and keep getting a little better every day. Donβt let anyone make you feel less than who you really are. Don't be busy in a none sense comparison and start focusing on yourself.
β€8π―5
Forwarded from Mira
umm... yap
If you take hacking as a profession, experimenting with MCP is one of the cooler things you can do right now. it gives you a structured, protocol-driven way to expose tools (nmap, Burp, gobuster, even your scripts) as providers an LLM can call in sequence. basically it turns a model into an orchestrator that can handle recon workflows end-to-end without you manually chaining pipes. lemme give you this simple scenario: the agent runs nmap on a target. it parses the ports. decides to run gobuster on the exposed web service. maybe passes results to your own recon script. and finally presents you a nice little summary instead of 9000 lines of stdout. because MCP enforces standardized interfaces, you can sandbox providers, log and audit tool calls, and even apply policy/guardrails at the protocol layer, which is huge for both red-teamers (think pivoting across networked MCP providers or poisoning context feeds) and blue-teamers (detecting malicious providers or restricting unsafe tool use). it's even plausible in places where the ecosystemβs still rough and docs are obscure. you can start local with OSS GPTs to prototype, then move to the cloud when you need scale or shared workflows and integrations with CI/CD or SOC pipelines. maybe a hot take, but i feel like in a few years manually juggling pentest tools might feel irrelevant given that the fast dynamics in the field.
#meyapping
If you take hacking as a profession, experimenting with MCP is one of the cooler things you can do right now. it gives you a structured, protocol-driven way to expose tools (nmap, Burp, gobuster, even your scripts) as providers an LLM can call in sequence. basically it turns a model into an orchestrator that can handle recon workflows end-to-end without you manually chaining pipes. lemme give you this simple scenario: the agent runs nmap on a target. it parses the ports. decides to run gobuster on the exposed web service. maybe passes results to your own recon script. and finally presents you a nice little summary instead of 9000 lines of stdout. because MCP enforces standardized interfaces, you can sandbox providers, log and audit tool calls, and even apply policy/guardrails at the protocol layer, which is huge for both red-teamers (think pivoting across networked MCP providers or poisoning context feeds) and blue-teamers (detecting malicious providers or restricting unsafe tool use). it's even plausible in places where the ecosystemβs still rough and docs are obscure. you can start local with OSS GPTs to prototype, then move to the cloud when you need scale or shared workflows and integrations with CI/CD or SOC pipelines. maybe a hot take, but i feel like in a few years manually juggling pentest tools might feel irrelevant given that the fast dynamics in the field.
#meyapping
β‘5π3π―3
perplexity ai is giving one month free pro usage for students
go and grab this opportunity :))
https://www.perplexity.ai/students
@AfroSec
go and grab this opportunity :))
https://www.perplexity.ai/students
@AfroSec
β‘5π₯2π1
Forwarded from Tilet solution (Nebyat B Ξ)
You donβt have to shine all the time. The moon rests too.
π₯6β€3