πŸ§ͺ Experimental Feature

Tag-based content organization is an experimental feature. This page and its functionality may change as we refine the tagging system.

Tag: Mobile Pentesting

Focus Area: πŸ“± Mobile Security
16
Total Entries
21
Contributors

Top Contributors

Subho Halder(3) Aditya Gupta(2) Abhishek Jm(1) Aditi Bhatnagar(1) Ajin Abraham(1)

All Entries (16 total, sorted by date)

DateTypeConferenceTitleSpeaker(s)Tags
2025-12-10Tool demoBlackhat Breaking the Tunnel: Real-Time API Interception in MDM-Locked Mobile Apps with KnoxSpy Source Code Subho Halder#mobile-pentesting#vulnerability-assessment#android-security
2025-08-06Tool demoBlackhat MORF – Mobile Reconnaissance Framework Source Code Amrudesh Balakrishnan, Abhishek Jm#app-security#mobile-pentesting#static-analysis+3
2024-04-18Tool demoBlackhat APKDeepLens - Android security insights in full spectrum Source Code Atul Singh, Deepanshu Gajbhiye#android-security#static-analysis#mobile-pentesting+1
2023-12-07Tool demoBlackhat Mobile Security Framework - MobSF Source Code Ajin Abraham#android-security#ios-security#mobile-pentesting+2
2022-09-24TalkC0c0n Citizen Mobile Security (ICAMPS) Satyendra Verma#android-security#ios-security#mobile-pentesting+3
2022-09-23TalkC0c0n Pwning Android Apps at Scale Sparsh Kulshrestha, Shashank Barthwal#android-security#mobile-pentesting#reverse-engineering+2
2022-07-24TalkMaycontainhackers No Permissions Needed! Video Aditi Bhatnagar#android-security#data-protection#mobile-pentesting+1
2022-03-25TalkInsomnihack Attacking Bluetooth LE design and implementation in mobile + wearables ecosystems Video Nitin Lakshmanan, Sunil Kumar 1#bluetooth#hardware-embedded#iot-pentesting+4
2019-08-11TalkDefcon Exploiting and Securing iOS Apps using OWASP iGoat Swaroop Yermalkar#ios-security#application-pentesting#security-assessment+3
2017-08-18TalkC0c0n Case study: Security of Digital Wallet apps in India Ashwath Kumar, Sandesh Mysore Anand#appsec#mobile-pentesting#application-hardening+4
2017-08-17TalkUsenix BootStomp: On the Security of Bootloaders in Mobile Devices Presentation Whitepaper Video Aravind Machiry, Dipanjan Das, Nilo Redini, Yanick Fratantonio, Antonio Bianchi, Eric Gustafson, Yan Shoshitaishvali, Christopher Kruegel, Giovanni Vigna#firmware-analysis#embedded-security#binary-analysis+1
2016-11-06TalkGroundzerosummit Hacking The Droids Anto Joseph#android-security#reverse-engineering#security-assessment+2
2013-09-12TalkGrrcon The Droid Exploitation Saga – All Over Again! Aditya Gupta, Subho Halder#android#red-teaming#android-security+4
2012-10-25TalkAppsecusa Cracking the Code of Mobile Application Video Sreenarayan Ashokkumar#reverse-engineering#mobile-pentesting#android-security+2
2012-09-28TalkNullcon Attacking Angry Droids Aditya Gupta, Subho Halder#android-security#reverse-engineering#security-assessment+1
2009-12-05TalkClubhack Mobile Application Security Testing Presentation Gursev Singh Kalra#security-assessment#mobile-pentesting#application-pentesting+4