Mobile Apps Security Testing
@MobileSecurityTesting
1.86K
subscribers
9
files
423
links
Download Telegram
Join
Mobile Apps Security Testing
1.86K subscribers
Mobile Apps Security Testing
https://www.inversecos.com/2022/06/how-to-reverse-engineer-and-patch-ios.html
Inversecos
How to Reverse Engineer and Patch an iOS Application for Beginners: Part I
Mobile Apps Security Testing
https://guptashubham.com/blog/lab-setup-for-android-pentesting-on-android-emulator-m1-macbook
Mobile Apps Security Testing
https://bughunters.google.com/learn/presentations/5783688075542528/android-app-hacking-workshop
Google
Android App Hacking Workshop | Google Bug Hunters
Tip: Looking for additional resources on researching and hacking Android apps to complement this workshop? See our dedicated Android learning page for inspiration! Welcome to the world of Android Hacking! This is a hands-on workshop designed to...
Mobile Apps Security Testing
https://dhiyaneshgeek.github.io/mobile/security/2021/12/25/hopper-disassembler/
Geek Freak
Hopper Disassembler
Bypassing Jail Break Detection
Mobile Apps Security Testing
https://github.com/NVISOsecurity/frida-ios-playground
GitHub
GitHub - NVISOsecurity/frida-ios-playground: An iOS app that lets you practice your Frida skills
An iOS app that lets you practice your Frida skills - NVISOsecurity/frida-ios-playground
Mobile Apps Security Testing
https://8ksec.io/android-deeplink-and-webview-exploitation-8ksec-blogs/
8kSec - 8kSec is a cybersecurity research & training company. We provide high-quality training & consulting services.
Android Deep Link issues and WebView Exploitation | 8kSec Blogs
In this Blog post, learn about Android deep link and WebView issues, explaining their targets, exploitation and security measures. Read now
Mobile Apps Security Testing
https://github.com/randorisec/MobileHackingCheatSheet
GitHub
GitHub - randorisec/MobileHackingCheatSheet: Basics on commands/tools/info on how to assess the security of mobile applications
Basics on commands/tools/info on how to assess the security of mobile applications - randorisec/MobileHackingCheatSheet
Mobile Apps Security Testing
https://github.com/oversecured/ovaa
GitHub
GitHub - oversecured/ovaa: Oversecured Vulnerable Android App
Oversecured Vulnerable Android App. Contribute to oversecured/ovaa development by creating an account on GitHub.
Mobile Apps Security Testing
https://github.com/DERE-ad2001/Frida-Labs/tree/main
GitHub
GitHub - DERE-ad2001/Frida-Labs: The repo contains a series of challenges for learning Frida for Android Exploitation.
The repo contains a series of challenges for learning Frida for Android Exploitation. - DERE-ad2001/Frida-Labs
Mobile Apps Security Testing
https://8ksec.io/advanced-frida-usage-part-1-ios-encryption-libraries-8ksec-blogs/
8kSec - 8kSec is a cybersecurity research & training company. We provide high-quality training & consulting services.
Advanced Frida Usage Part 1 – iOS Encryption Libraries | 8kSec Blogs
In Advanced Frida Usage Part 1 - Explore how to decrypt EncryptedStore, interact with encrypted databases and perform AES encryption / decryption.
Mobile Apps Security Testing
https://8ksec.io/advanced-frida-usage-part-2-analyzing-signal-and-telegram-messages-on-ios/
8kSec - 8kSec is a cybersecurity research & training company. We provide high-quality training & consulting services.
Advanced Frida Usage Part 2 – Analyzing Signal And Telegram Messages On iOS | 8kSec Blogs
In Part 2 of Advanced Frida Usage Series, Learn how to dissect Signal and Telegram communication on iOS, revealing message content, metadata, encryption keys and more.
Mobile Apps Security Testing
https://8ksec.io/advanced-frida-usage-part-3-inspecting-ios-xpc-calls/
8kSec - 8kSec is a cybersecurity research & training company. We provide high-quality training & consulting services.
Advanced Frida Usage Part 3 – Inspecting XPC Calls - 8kSec
In Part 3, Explore inner workings of XPC communication between processes on iOS, intercept and modify XPC messages for advanced insights. Read now!
Mobile Apps Security Testing
https://8ksec.io/advanced-frida-usage-part-4-sniffing-location-data-from-locationd-in-ios/
8kSec - 8kSec is a cybersecurity research & training company. We provide high-quality training & consulting services.
Advanced Frida Usage Part 4 – Sniffing Location Data From Locationd In OS
In Part 4, Learn the intricate process of sniffing and manipulating location data on iOS using Frida. Read more to learn
Mobile Apps Security Testing
https://8ksec.io/advanced-root-detection-bypass-techniques/
8kSec - 8kSec is a cybersecurity research & training company. We provide high-quality training & consulting services.
Advanced Frida Usage Part 5 – Advanced Root Detection & Bypass Techniques
Explore techniques related to root detection on Android devices and methods to bypass it.
Mobile Apps Security Testing
https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/trustwave-spiderlabs-guide-jailbreaking-apple-ios-17-and-above
Trustwave
Trustwave SpiderLabs Guide: Jailbreaking Apple iOS 17 and Above
Jailbreaking Apple iOS devices is a well-known practice that enables Apple device owners to in unauthorized access to the device’s root file system, enabling the user to remove restrictions imposed by Apple.
Mobile Apps Security Testing
https://trustedsec.com/blog/a-beginners-guide-to-mobile-application-testing
TrustedSec
A Beginner’s Guide to Mobile Application Testing
Mobile Apps Security Testing
https://gist.github.com/Pulimet/5013acf2cd5b28e55036c82c91bd56d8
Gist
Adb useful commands list
Adb useful commands list. GitHub Gist: instantly share code, notes, and snippets.
Mobile Apps Security Testing
https://canijailbreak.ams1gn.id/
Can I Jailbreak
Can I Jailbreak - iOS Device Compatibility Checker
Instantly check jailbreak availability for your iPhone or iPad. Find compatible tools and get started with jailbreaking your iOS device.
Mobile Apps Security Testing
https://www.blackhillsinfosec.com/intercepting-traffic-for-mobile-applications/
Black Hills Information Security, Inc.
Intercepting Traffic for Mobile Applications that Bypass the System Proxy - Black Hills Information Security, Inc.
This is a foolproof guide to intercepting traffic from mobile applications built on Flutter, which historically have been especially challenging to intercept.
Mobile Apps Security Testing
https://blog.nviso.eu/2025/06/05/intercepting-traffic-on-android-with-mainline-and-conscrypt/?amp
NVISO Labs
Intercepting traffic on Android with Mainline and Conscrypt
A deep-dive into Conscrypt updates via Mainline and the impact on Android 11 to Android 16.