Posts by Category

Hacking

Install a trusted CA in Android N

  1 minute read

It’s very trivial to install a user-trusted certificate on Android. Under Settings -> Security you can install new trusted certificates. However, this cre...

Useful Magisk modules

  less than 1 minute read

MagiskHide Props Config Even on a rooted Android phones, you won’t be able to debug your apps if they are built as non-debuggable. In order to work around th...

Frida cheat sheet

  5 minute read

Frida is particularly useful for dynamic analysis on Android/iOS/Windows applications. It allows us to set up hooks on the target functions so that we can in...

Back to Top ↑

OSCP

LFI and RFI

  2 minute read

LFI happens when an PHP page explicitly calls include function to embed another PHP page, which can be controlled by the attacker. For example, addguestbook....

Transfer files from Kali to the target machine

  1 minute read

Tranfer files to the target machine is particularly useful when we have already had a reverse shell on Windows. Windows does not have convenient commands to ...

Back to Top ↑

Programming

RB App Checker

  less than 1 minute read

This tiny yet powerful app lets us check the iOS application for the certificates, requirements and entitlements, embedded provisioning profiles, auxiliary e...

Handy Android code snippets

  less than 1 minute read

This blog post is a memo of handy Android code snippets that I found particularly useful in programming and hacking.

Back to Top ↑