Kush YadavAndroid Application Security Part4: Insecure Data StorageInsecure data storage vulnerabilitiesNov 25
Sec ZoneContent Provider in AndroidContent provider is a way for different apps to share information with each other. It’s like having a big library where different apps can…Mar 28Mar 28
Mohamed redaCyCTF finals 2024: Armor&StealerHello, everyone! Today, I’m gonna explain how I solved the armor at the CTF time and Stealer after it ends.Nov 22Nov 22
Aimar Sechan AdhityaBypassing Root Detection the Universal WayGetting tired of reverse engineering obfuscated codes to bypass root detection? Time to learn the better way!Jan 121Jan 121
Kush YadavAndroid Application Security Part4: Insecure Data StorageInsecure data storage vulnerabilitiesNov 25
Sec ZoneContent Provider in AndroidContent provider is a way for different apps to share information with each other. It’s like having a big library where different apps can…Mar 28
Mohamed redaCyCTF finals 2024: Armor&StealerHello, everyone! Today, I’m gonna explain how I solved the armor at the CTF time and Stealer after it ends.Nov 22
Aimar Sechan AdhityaBypassing Root Detection the Universal WayGetting tired of reverse engineering obfuscated codes to bypass root detection? Time to learn the better way!Jan 121
Gaurav KumarEnhancing App Security: Best Practices for Modern Android DevelopmentIn the era of cyber threats and data breaches, securing your Android app is no longer optional — it’s a necessity. Users trust developers…Nov 23
Mun BonecciHow to encrypt Room DB using SQLCipherIn this tutorial, we will see a way to encrypt your Room database with SQLCipher, and we will also add a function to migrate an unencrypted…Feb 272
AshhadaliHow to Set Up a Mobile Pentesting Lab at HomeCreating a mobile pentesting lab at home can help you safely test and analyze mobile applications. Below are the steps you need to follow…Nov 20