appsec.fyi

Mobile Security Resources

Post Share

A curated AppSec resource library covering XSS, SQLi, SSRF, IDOR, RCE, XXE, OSINT, and more.

Mobile Security

Mobile application security encompasses the unique attack surface of iOS and Android applications, including insecure local data storage, weak transport layer protection, insufficient binary protections, and client-side injection vulnerabilities. The OWASP Mobile Top 10 highlights risks such as improper platform usage, insecure data storage, insecure communication, insecure authentication, insufficient cryptography, and code tampering. Mobile apps face threats that web applications do not: reverse engineering of client-side code, certificate pinning bypass, inter-process communication attacks, and exploitation of platform-specific features like deep links, content providers, and keychain storage. Tools like Frida, objection, MobSF, and Jadx enable dynamic instrumentation and static analysis of mobile binaries, while proxy tools allow interception of API traffic for server-side testing.

Date Added Link Excerpt
2026-04-22 NEW 2026Root/Jailbreak Detection and SSL Pinning in KMMRoot/Jailbreak Detection and SSL Pinning in KMM
2026-04-22 NEW 2026Reversing Android Apps: Bypassing Detection Like a ProReversing Android Apps: Bypassing Detection Like a Pro
2026-04-22 NEW 2026Reverse engineering and modifying Android apps with JADX and FridaReverse engineering and modifying Android apps with JADX and Frida
2026-04-22 NEW 2026Common Vulnerabilities and Exposures Examples in Mobile AppsCommon Vulnerabilities and Exposures Examples in Mobile Apps
2026-04-22 NEW 2026Bypassing iOS Frida Detection with LLDB and FridaBypassing iOS Frida Detection with LLDB and Frida
2026-04-22 NEW 2026frida-interception-and-unpinning: Scripts to MitM all HTTPS trafficfrida-interception-and-unpinning: Scripts to MitM all HTTPS traffic
2026-04-22 NEW 2026Android Reports and ResourcesAndroid Reports and Resources
2026-04-22 NEW 2026iOS Security Testing - OWASP MASTGiOS Security Testing - OWASP MASTG
2026-04-22 NEW 2026Android Security Bulletin - March 2026Android Security Bulletin - March 2026
2026-04-22 NEW 2026Android Security Bulletin - April 2026Android Security Bulletin - April 2026
2026-04-19 NEW 2026Zero-Day Vulnerabilities in Apple WebKit — CSA SingaporeZero-Day Vulnerabilities in Apple WebKit — CSA Singapore
2026-04-19 NEW 2026Update Apple Devices: Actively Exploited CVE-2025-14174 & CVE-2025-43529Update Apple Devices: Actively Exploited CVE-2025-14174 & CVE-2025-43529
2026-04-19 NEW 2026CVE-2025-14174: Apple WebKit Memory Corruption Zero-DayCVE-2025-14174: Apple WebKit Memory Corruption Zero-Day
2026-04-19 NEW 2026Two Serious Vulnerabilities in Latest Android Security UpdateTwo Serious Vulnerabilities in Latest Android Security Update
2026-04-19 NEW 2026LANDFALL: New Commercial-Grade Android Spyware (CVE-2025-21042)LANDFALL: New Commercial-Grade Android Spyware (CVE-2025-21042)
2026-04-16 NEW 2026Awesome Android Reverse Engineering: Curated ListAwesome Android Reverse Engineering: Curated List
2026-04-16 NEW 2026Android App Reverse Engineering 101Android App Reverse Engineering 101
2026-04-16 NEW 2026Exploiting Android Fingerprint AuthenticationExploiting Android Fingerprint Authentication
2026-04-16 NEW 2026Android Keystore Pitfalls and Best PracticesAndroid Keystore Pitfalls and Best Practices
2026-04-16 NEW 2026Frida's Impact on Mobile Security and How to Fight BackFrida's Impact on Mobile Security and How to Fight Back
2026-04-16 NEW 2026From an Android Hook to RCE: $5000 BountyFrom an Android Hook to RCE: $5000 Bounty
2026-04-16 NEW 2026iOS Reverse Engineering: Defeating Anti-Debug and Extracting Hidden FlagiOS Reverse Engineering: Defeating Anti-Debug and Extracting Hidden Flag
2026-04-16 NEW 2026DarkSword iOS Exploit Chain Adopted by Multiple Threat Actors - GoogleDarkSword iOS Exploit Chain Adopted by Multiple Threat Actors - Google
2026-04-16 NEW 2026Inside DarkSword: A New iOS Exploit Kit - iVerifyInside DarkSword: A New iOS Exploit Kit - iVerify
2026-04-16 NEW 2026DarkSword iOS Exploit Kit: 6 Flaws and 3 Zero-Days for Full TakeoverDarkSword iOS Exploit Kit: 6 Flaws and 3 Zero-Days for Full Takeover
2026-04-11 2026Exploiting Content Providers in Android ApplicationsExploiting Content Providers in Android Applications
2026-04-11 2026SQL injection vulnerabilities in Owncloud Android appSQL injection vulnerabilities in Owncloud Android app
2026-04-11 2026Android, SQL and ContentProviders - Why SQL injections aren't dead yetAndroid, SQL and ContentProviders - Why SQL injections aren't dead yet
2026-04-11 2026iOS Universal Links - HackTricksiOS Universal Links - HackTricks
2026-04-11 2026MASTG-TEST-0070: Testing Universal LinksMASTG-TEST-0070: Testing Universal Links
2026-04-11 2026Mobile OAuth Attacks - iOS URL Scheme Hijacking RevampedMobile OAuth Attacks - iOS URL Scheme Hijacking Revamped
2026-04-11 2026Exploiting Android WebView VulnerabilitiesExploiting Android WebView Vulnerabilities
2026-04-11 2026Android security checklist: WebView - Oversecured BlogAndroid security checklist: WebView - Oversecured Blog
2026-04-11 2026WebView addJavascriptInterface Remote Code Execution - WithSecure LabsWebView addJavascriptInterface Remote Code Execution - WithSecure Labs
2026-04-11 2026Exploiting Insecure Android WebView with JavaScript InterfaceExploiting Insecure Android WebView with JavaScript Interface
2026-04-11 2026Mobile Security Framework - MobSF DocumentationMobile Security Framework - MobSF Documentation
2026-04-11 2026MobSF: Mobile Security Framework (GitHub)MobSF: Mobile Security Framework (GitHub)
2026-04-11 2026Deep Linking Vulnerabilities - Application Security Cheat SheetDeep Linking Vulnerabilities - Application Security Cheat Sheet
2026-04-11 2026Android Intent Redirection: A Hacker's Gateway to Internal ComponentsAndroid Intent Redirection: A Hacker's Gateway to Internal Components
2026-04-11 2026From Browser to Breach: One-Click Android Deep Link ExploitationFrom Browser to Breach: One-Click Android Deep Link Exploitation
2026-04-11 2026Unsafe use of deep links - Android Developers SecurityUnsafe use of deep links - Android Developers Security
2026-04-11 2026Android Pentest: Deep Link ExploitationAndroid Pentest: Deep Link Exploitation
2026-04-11 2026A Comprehensive Guide to iOS Jailbreak Detection BypassA Comprehensive Guide to iOS Jailbreak Detection Bypass
2026-04-11 2026Bypassing iOS Security Suite: Jailbreak Detection Explained and TestedBypassing iOS Security Suite: Jailbreak Detection Explained and Tested
2026-04-11 2026Frida CodeShare: iOS Jailbreak Detection BypassFrida CodeShare: iOS Jailbreak Detection Bypass
2026-04-11 2026iOS Jailbreak Detection Bypass with Frida - Full GuideiOS Jailbreak Detection Bypass with Frida - Full Guide
2026-04-11 2026Android 15 Vulnerabilities: A Comprehensive Security Research AnalysisAndroid 15 Vulnerabilities: A Comprehensive Security Research Analysis
2026-04-11 2026December 2025 Android Security Bulletin: Two Zero-Day Flaws ExploitedDecember 2025 Android Security Bulletin: Two Zero-Day Flaws Exploited
2026-04-11 2026Android Security Bulletin - December 2025Android Security Bulletin - December 2025
2026-04-11 2026Intent redirection vulnerability in third-party SDK exposed millions of Android walletsIntent redirection vulnerability in third-party SDK exposed millions of Android wallets
2026-04-10 2026Mobile App Security Testing Guide 2026Mobile App Security Testing Guide 2026
2026-04-10 2026Frida - OWASP Mobile Application Security ToolFrida - OWASP Mobile Application Security Tool
2026-04-10 2026OWASP MASTG Testing GuideOWASP MASTG Testing Guide
2026-04-10 2026OWASP MASVS & MASTG: Mobile Security Guide (2026)OWASP MASVS & MASTG: Mobile Security Guide (2026)
2026-04-10 2026Mobile App Tampering and Reverse Engineering - OWASP MASTGMobile App Tampering and Reverse Engineering - OWASP MASTG
2026-04-10 2026A Comprehensive Guide to iOS Penetration TestingA Comprehensive Guide to iOS Penetration Testing
2026-04-10 2026iOS Penetration Testing: Definition, Process and ToolsiOS Penetration Testing: Definition, Process and Tools
2026-04-10 2026iOS App Reverse Engineering: Tools & TacticsiOS App Reverse Engineering: Tools & Tactics
2026-04-10 2026iOS Pentesting Checklist: Complete Guide for 2026iOS Pentesting Checklist: Complete Guide for 2026
2026-04-10 2026Understanding Mobile App Reverse Engineering: How Attackers Break AppsUnderstanding Mobile App Reverse Engineering: How Attackers Break Apps
2026-04-10 20262025 Phone Security Guide: Android vs iOS2025 Phone Security Guide: Android vs iOS
2026-04-10 2026Android vs iOS Security ComparisonAndroid vs iOS Security Comparison
2026-04-10 2026iOS vs Android Security: Which Is More Secure?iOS vs Android Security: Which Is More Secure?
2026-04-10 2026iOS Devices Face Twice the Phishing Attacks of AndroidiOS Devices Face Twice the Phishing Attacks of Android
2026-04-10 2026iOS vs Android Security Comparison 2025iOS vs Android Security Comparison 2025
2026-04-10 2026Common Mobile Application Security Vulnerabilities 2025Common Mobile Application Security Vulnerabilities 2025
2026-04-10 20262025 Global Mobile Threat Report2025 Global Mobile Threat Report
2026-04-10 2026Mobile Security Testing Challenges: 2025-2026 OutlookMobile Security Testing Challenges: 2025-2026 Outlook
2026-04-10 2026App Threat Report 2025 Q1: Android and iOSApp Threat Report 2025 Q1: Android and iOS
2026-04-10 2026Mobile App Security Testing in 2026: Statistics and OWASP ThreatsMobile App Security Testing in 2026: Statistics and OWASP Threats
2026-04-06 2026Hacking Android and IOT Apps by Example - DEF CON Training LV 2026Hacking Android and IOT Apps by Example - DEF CON Training LV 2026
2026-04-06 2026Mobile Application Penetration Testing: iOS and AndroidMobile Application Penetration Testing: iOS and Android
2026-04-06 202610 Mobile App Security Best Practices for 202610 Mobile App Security Best Practices for 2026
2026-04-06 2026Grapefruit: Open-source mobile security testing suiteGrapefruit: Open-source mobile security testing suite
2026-04-06 2026Objection 2026: Runtime Mobile Exploration via FridaObjection 2026: Runtime Mobile Exploration via Frida
2026-04-03 2026OWASP Mobile Top 10 2024: A Security GuideOWASP Mobile Top 10 2024: A Security Guide
2026-04-03 2026OWASP Mobile Top 10 and MobSFOWASP Mobile Top 10 and MobSF
2026-04-03 2026Bypassing Certificate Pinning Using Frida: A Step-by-Step GuideBypassing Certificate Pinning Using Frida: A Step-by-Step Guide
2026-04-03 2026Hail Frida!! The Universal SSL Pinning Bypass for AndroidHail Frida!! The Universal SSL Pinning Bypass for Android
2026-04-03 2026OWASP Mobile Top 10 (2024) — Bug Bounty Hunter's GuideOWASP Mobile Top 10 (2024) — Bug Bounty Hunter's Guide
2026-04-03 2026Four Ways to Bypass Android SSL Verification and Certificate Pinning | NetSPIFour Ways to Bypass Android SSL Verification and Certificate Pinning | NetSPI
2026-04-03 2026Bypassing Certificate Pinning | OWASP MASTGBypassing Certificate Pinning | OWASP MASTG
2026-04-03 2026Defeating Android Certificate Pinning with FridaDefeating Android Certificate Pinning with Frida
2026-04-03 2026OWASP Mobile Top 10OWASP Mobile Top 10
2026-04-03 2026OWASP Mobile Application Security (MAS)OWASP Mobile Application Security (MAS)
2026-04-03 2026What is Mobile Security? | IBMMobile device security refers to being free from danger or risk of an asset loss or data loss by using mobile computers and communication hardware.

Frequently Asked Questions

What is the OWASP Mobile Top 10?
The OWASP Mobile Top 10 covers the most critical mobile application security risks: Improper Credential Usage, Inadequate Supply Chain Security, Insecure Authentication/Authorization, Insufficient Input/Output Validation, Insecure Communication, Inadequate Privacy Controls, Insufficient Binary Protections, Security Misconfiguration, Insecure Data Storage, and Insufficient Cryptography.
What tools are used for mobile app security testing?
Essential tools include Frida and objection for dynamic instrumentation, MobSF for automated static and dynamic analysis, Jadx and apktool for Android reverse engineering, Hopper and Ghidra for iOS binary analysis, and proxy tools like Burp Suite or mitmproxy for intercepting API traffic with certificate pinning bypass.
How is mobile security testing different from web testing?
Mobile testing adds client-side concerns: local data storage, binary protections, certificate pinning, inter-app communication, and platform-specific features. You must analyze the compiled binary, not just network traffic. Reverse engineering reveals hardcoded secrets, hidden endpoints, and client-side logic that attackers can manipulate.

Weekly AppSec Digest

Get new resources delivered every Monday.