
FatalSec
@secfatal
Technology enthusiast and mobile security researcher experienced in pentesting of mobile apps. Reach out at [email protected] for technical consultation.
ID: 1578015885444673538
06-10-2022 13:35:11
92 Tweet
437 Takipçi
93 Takip Edilen






How to track which instruction modifies a specific memory location or finding the memory address of your target value? This video covers how to use Frida’s new setHardwareBreakpoint API to tackle these challenges! Frida Ole André V. Ravnås Mobile Security youtu.be/qmvp0OgatR0


iOS Hardening Guide #MobileSecurity #iOSsecurity by Martin Holovský github.com/martinholovsky…




There is a small bug in the signature verification of OTA packages in the Android Open Source Framework. Official builds doing normal double verification of packages are not vulnerable but OEMs and third party apps may be. Jérémy Jourdois explains it here: blog.quarkslab.com/aosp_ota_signa…


Attention Kali Linux users! In the coming day(s), apt update is going to fail for pretty much everyone. The reason? We had to roll a new signing key for the Kali repository. You need to download and install the new key manually: offs.ec/4lUEtak


Want to learn how to read and hack C structures directly from memory using Frida? Check out this demo where we break it down step by step! Watch now: youtu.be/ozUMyCYiKOQ Mobile Security #Frida #ReverseEngineering #CStructures #frida #MemoryHacking


