First‑ever Mobile Hacking Conference, happening next week — fully online and completely free.
I’ve summarized everything you need to know in one place — speakers, talks, CTFs, giveaways, free courses, and more.
https://www.mobile-hacker.com/2026/02/23/the-first-mobile-hacking-conference-is-coming-this-march/
I’ve summarized everything you need to know in one place — speakers, talks, CTFs, giveaways, free courses, and more.
https://www.mobile-hacker.com/2026/02/23/the-first-mobile-hacking-conference-is-coming-this-march/
👍20🎃9👏3❤1
SURXRAT: From ArsinkRAT roots to LLM Module Downloads Signaling Capability Expansion
https://cyble.com/blog/surxrat-downloads-large-llm-module-from-hugging-face/
https://cyble.com/blog/surxrat-downloads-large-llm-module-from-hugging-face/
Cyble
SURXRAT Downloads Large LLM Module From Hugging Face
Cyble uncovers SURXRAT’s evolution across versions, built on ArsinkRAT code, and now downloading large LLM modules signaling an expansion of its operational capabilities.
❤6⚡3👍3
A Step-by-Step Guide to Uncovering Vulnerabilities in a Mobile App
https://ahmadaabdulla.medium.com/a-step-by-step-guide-to-uncovering-vulnerabilities-in-a-mobile-app-5a6b05e6b23b
https://ahmadaabdulla.medium.com/a-step-by-step-guide-to-uncovering-vulnerabilities-in-a-mobile-app-5a6b05e6b23b
Medium
A Step-by-Step Guide to Uncovering Vulnerabilities in a Mobile App
❤15👍6🎃3
Android mental health apps are filled with security flaws
https://www.bleepingcomputer.com/news/security/android-mental-health-apps-with-147m-installs-filled-with-security-flaws/
https://www.bleepingcomputer.com/news/security/android-mental-health-apps-with-147m-installs-filled-with-security-flaws/
BleepingComputer
Android mental health apps with 14.7M installs filled with security flaws
Several mental health mobile apps with millions of downloads on Google Play contain security vulnerabilities that could expose users' sensitive medical information.
❤17🎃5👍4😨1
How Predator spyware defeats iOS recording indicators
https://www.jamf.com/blog/predator-spyware-ios-recording-indicator-bypass-analysis/
https://www.jamf.com/blog/predator-spyware-ios-recording-indicator-bypass-analysis/
Jamf
How Predator Spyware Defeats iOS Recording Indicators
An analysis documenting how a commercial spyware sample, Predator, operates post-compromise.
👍13🤣3🎃3❤2🥰1
How to run virtual iOS 26 iPhone on Apple Silicon Macs, built from Apple’s Private Cloud Compute firmware
https://github.com/wh1te4ever/super-tart-vphone-writeup
https://github.com/wh1te4ever/super-tart-vphone-writeup
GitHub
GitHub - wh1te4ever/super-tart-vphone-writeup
Contribute to wh1te4ever/super-tart-vphone-writeup development by creating an account on GitHub.
❤10🎃4👍2
artifacts: CLI toolkit for static triage of suspicious APKs
https://github.com/drego85/artifacts
https://github.com/drego85/artifacts
GitHub
GitHub - drego85/artifacts: artifacts is a CLI toolkit for static triage of suspicious APKs.
artifacts is a CLI toolkit for static triage of suspicious APKs. - drego85/artifacts
❤8👍3
Gadgetinjector: Frida Gadget injector for iOS 17 / iOS 18 IPAs, designed to work with Objection in listen mode
https://github.com/Saurabh221662/GadgetInjector
https://github.com/Saurabh221662/GadgetInjector
GitHub
GitHub - Saurabh221662/GadgetInjector
Contribute to Saurabh221662/GadgetInjector development by creating an account on GitHub.
👍11❤3
Captures Android network traffic without proxies or certificates
https://github.com/ProxymanApp/atlantis-android
https://github.com/ProxymanApp/atlantis-android
GitHub
GitHub - ProxymanApp/atlantis-android: Capture HTTP/HTTPS traffic from Android apps and send to Proxyman for debugging.
Capture HTTP/HTTPS traffic from Android apps and send to Proxyman for debugging. - ProxymanApp/atlantis-android
❤13🎃2🤡1
1 script to run the virtual iPhone (iOS 26.1), already jailbroken with full bootstrap installed on Mac
https://github.com/34306/vphone-aio
https://github.com/34306/vphone-aio
GitHub
GitHub - 34306/vphone-aio: 1 script run the vphone
1 script run the vphone. Contribute to 34306/vphone-aio development by creating an account on GitHub.
👍23❤4👎1
areclaw: Android Reverse Engineering CLI Automation Workspace. AI-driven security analysis with Claude Code.
https://github.com/TheQmaks/areclaw
https://github.com/TheQmaks/areclaw
GitHub
GitHub - TheQmaks/areclaw: Android Reverse Engineering Command-Line Automation Workspace. AI-driven security analysis with Claude…
Android Reverse Engineering Command-Line Automation Workspace. AI-driven security analysis with Claude Code. - TheQmaks/areclaw
🤡8🎃6❤4😘2👍1👏1
🔴 We’re LIVE! Join the Mobile Hacking Conference Now.
Be part of the live stream and dive into the latest mobile security and hacking research
Join here: https://www.youtube.com/watch?v=yFROPsi6J7Y
Be part of the live stream and dive into the latest mobile security and hacking research
Join here: https://www.youtube.com/watch?v=yFROPsi6J7Y
YouTube
🔴 Live: Mobile Hacking Conference | Day 1 + CTF (Pt. 2)
⏳ Video Chapters
00:00 - Practical Heap Exploitation Against Android’s Scudo – Simon Janz - Q&A
44:42 - Breaking into Mobile Phones for Law Enforcement – Gersi Hajrullahi
1:49:29 - Evolution of NFC Threats – Lukas Stefanko
2:45:39 - KYC Security Review and…
00:00 - Practical Heap Exploitation Against Android’s Scudo – Simon Janz - Q&A
44:42 - Breaking into Mobile Phones for Law Enforcement – Gersi Hajrullahi
1:49:29 - Evolution of NFC Threats – Lukas Stefanko
2:45:39 - KYC Security Review and…
🔥10
Coruna: Inside the Nation-State-Grade iOS Exploit Kit We've Been Tracking
https://iverify.io/blog/coruna-inside-the-nation-state-grade-ios-exploit-kit-we-ve-been-tracking
https://iverify.io/blog/coruna-inside-the-nation-state-grade-ios-exploit-kit-we-ve-been-tracking
iverify.io
Coruna: Inside the Nation-State-Grade iOS Exploit Kit We've Been Tracking
Google's 'Coruna' iOS exploit kit targets iPhones via 23 exploits. See how iVerify's research expands these findings & what it means for everyday users
👍8❤3🔥3
🔴 Live: Mobile Hacking Conference | Day 2
https://www.youtube.com/watch?v=CfioCImyo1U
https://www.youtube.com/watch?v=CfioCImyo1U
YouTube
🔴 Live: Mobile Hacking Conference | Day 2
🚀 Exclusive Security Training Deals (Limited Time)
Level up your Android security, exploitation & forensics skills with these special discounts 👇
⏳ Video Chapters
00:00 - Intro & Giveaway Announcements
34:39 - Mobile Security Theater – Miłosz Gaczkowski…
Level up your Android security, exploitation & forensics skills with these special discounts 👇
⏳ Video Chapters
00:00 - Intro & Giveaway Announcements
34:39 - Mobile Security Theater – Miłosz Gaczkowski…
❤11👍5🎃2
RedAlert Trojan Campaign: Fake Emergency Alert App Spread via SMS Spoofing Israeli Home Front Command
https://www.cloudsek.com/blog/redalert-trojan-campaign-fake-emergency-alert-app-spread-via-sms-spoofing-israeli-home-front-command
https://www.cloudsek.com/blog/redalert-trojan-campaign-fake-emergency-alert-app-spread-via-sms-spoofing-israeli-home-front-command
Cloudsek
RedAlert Trojan Campaign: Fake Emergency Alert App Spread via SMS Spoofing Israeli Home Front Command | CloudSEK
CloudSEK has uncovered a malicious SMS spoofing campaign spreading a fake version of Israel’s “Red Alert” emergency app amid the ongoing conflict. Disguised as a trusted warning platform, the trojanized Android app can steal SMS, contacts, and location data…
👍7
Auto Frida v2.0: all-in-one Android security testing automation toolkit. Connect your device and let Auto Frida handle everything - from Frida installation to intelligent protection detection and bypass script generation
https://github.com/ommirkute/Auto-Frida
https://github.com/ommirkute/Auto-Frida
GitHub
GitHub - ommirkute/Auto-Frida: Auto Frida is a powerful, all-in-one automation toolkit that handles everything from Frida installation…
Auto Frida is a powerful, all-in-one automation toolkit that handles everything from Frida installation to script injection. Zero manual setup required – just connect your device and start testing....
❤10👍6👏3
Mobile malware evolution in 2025
https://securelist.com/mobile-threat-report-2025/119076/
https://securelist.com/mobile-threat-report-2025/119076/
Securelist
The mobile threat landscape in 2025
Statistics on Android malware and the most notable mobile threats of 2025: preinstalled backdoors Keenadu and Triada, spyware Trojans, the Kimwolf IoT botnet, and Mamont banking Trojans.
👍10❤1
Claude Code skill that automates Android APK decompilation and API endpoint extraction
https://github.com/SimoneAvogadro/android-reverse-engineering-skill
https://github.com/SimoneAvogadro/android-reverse-engineering-skill
GitHub
GitHub - SimoneAvogadro/android-reverse-engineering-skill: Claude Code skill to support Android app's reverse engineering
Claude Code skill to support Android app's reverse engineering - SimoneAvogadro/android-reverse-engineering-skill
👍19❤3
AndroHunter: A comprehensive Android security research toolkit for bug bounty hunters and mobile penetration testers
https://github.com/ynsmroztas/AndroHunter
https://github.com/ynsmroztas/AndroHunter
GitHub
GitHub - ynsmroztas/AndroHunter: AndroHunter
AndroHunter. Contribute to ynsmroztas/AndroHunter development by creating an account on GitHub.
👍9❤4
TAXISPY RAT : Analysis of TaxiSpy RAT – Russian Banking – Focused Android Malware with Full Remote Control
https://www.cyfirma.com/research/taxispy-rat-analysis-of-taxispy-rat-russian-banking-focused-android-malware-with-full-remote-control/
https://www.cyfirma.com/research/taxispy-rat-analysis-of-taxispy-rat-russian-banking-focused-android-malware-with-full-remote-control/
CYFIRMA
TAXISPY RAT : Analysis of TaxiSpy RAT - Russian Banking - Focused Android Malware with Full Remote Control - CYFIRMA
EXECUTIVE SUMMARY This report analyzes a highly sophisticated Android Banking Trojan with integrated Remote Access Trojan (RAT) functionality, specifically targeting...
👍14
iOS DYLIB injection tool for non-jailbreak devices with remote sandbox explorer
Blog: https://medium.com/@testing-guy/dynamic-analysis-of-ios-local-data-storage-on-non-jailbroken-devices-2e1717420af0
Github: https://github.com/test1ng-guy/iOS-sandbox-explorer
Blog: https://medium.com/@testing-guy/dynamic-analysis-of-ios-local-data-storage-on-non-jailbroken-devices-2e1717420af0
Github: https://github.com/test1ng-guy/iOS-sandbox-explorer
Medium
Dynamic Analysis of iOS Local Data Storage on Non-Jailbroken Devices
How I stopped fighting jailbreak and frida detection and learned to love the sandbox
👍13❤1