0xbinder

161 posts

0xbinder banner
0xbinder

0xbinder

@0xbind3r

Android Security Researcher

Katılım Aralık 2023
352 Takip Edilen93 Takipçiler
0xbinder retweetledi
Techjunkie Aman
Techjunkie Aman@Techjunkie_Aman·
Android modding is evolving again. Morphe is an open-source patch manager that lets you modify apps like YouTube and Reddit. Instead of installing modded APKs, it patches the official app directly on your device. How it works: • downloads the official APK • applies community patches • builds a customized version for you Supported apps currently include: • YouTube • YouTube Music • Reddit • other apps via community patches Popular features: • ad blocking • SponsorBlock integration • background playback • picture-in-picture support • Return YouTube Dislike • UI customization and theme tweaks • remove Shorts / feed elements • force video quality options Other details: • open source • works on non-root devices • patches update frequently • advanced mode for custom patch selection Basically, it lets you "morph" apps beyond their default limitations.
Techjunkie Aman tweet mediaTechjunkie Aman tweet media
English
80
243
2.8K
123.2K
0xbinder retweetledi
Andrey Konovalov
Andrey Konovalov@andreyknvl·
Gonna be teaching Exploiting the Android Kernel training at Zer0Con 2026 on March 30th — April 1st. This is a new training focused on data-only Android kernel exploitation techniques. Just a bit of time left to sign up. Pay attention to the requirements.
POC_Crew@POC_Crew

[Zer0Con2026] TRAINING “Exploiting the Android Kernel" by @andreyknvl 🗓️Date: 30th Mar ~ 1st April 2026 (3 DAYS) 📌Fairmont Ambassador Seoul, South Korea Sign up: #training-section" target="_blank" rel="nofollow noopener">zer0con.org/#training-sect… #Zer0Con2026

English
0
21
235
18K
0xbinder retweetledi
serioton
serioton@seriotonctf·
ctfs in 2026
serioton tweet media
English
7
68
537
20.8K
0xbinder retweetledi
Lingo.dev
Lingo.dev@lingodotdev·
Web scrapers are the pirates 🏴‍☠️ of the internet 😂
Lingo.dev tweet media
English
36
265
2.9K
61.3K
0xbinder retweetledi
fbiego
fbiego@fbiego_·
Installed a car tracker from a company in Kenya that advertises "top security, state of the art" features. But after looking into it... • Android app on Google Play is from a Chinese developer • iPhone app is generic, you must manually enter the server IP • Web dashboard looks like it was built in 2005. Not sure if this was meant to be shared with end-users, but I got access using the server IP. (hii ya .aspx ni backend gani?) The whole platform appears to be a white-label system built in China. After inspecting the web dashboard, I found the API it uses. Calling the API directly returns tracking data with no authentication needed. The identifier seems to be an auto-increment field. I queried a range of IDs and got 96 valid vehicles out of 100 with: • license plates • locations • mileage • vehicle status Plotted on a map, I could see where all these cars are. No hacking. No reverse engineering. Just an exposed API. Worst part? My own car is in that dataset. We definitely have developers in Kenya who could build secure, modern tracking platforms instead of relying on insecure white-label systems.
fbiego tweet media
English
53
289
895
58.3K
0xbinder retweetledi
8kSec
8kSec@8kSec·
Congratulations to the students who earned their 8kSec certifications over the last few weeks, each completing a 24–48 hour hands-on exploitation exam. • Adrian Castañeda – Certified Android Security Researcher (CASR) • Marcos González Sanz – Certified Android Security Researcher (CASR) • Shivam – Offensive Mobile Security Expert (OMSE) • Abdulraheem Khaled @Abdulrah33mK – Certified Mobile Security Engineer (CMSE) • Patchathep Chummanee – Certified Mobile Security Engineer (CMSE) • Ken Kitahara – Offensive Mobile Security Expert (OMSE) • Swagat Kumar @webspl01t3r – Certified Mobile Security Engineer (CMSE) • Alan K L Chung – Offensive Mobile Security Expert (OMSE) Each candidate worked in a uniquely provisioned live lab, identifying and exploiting real vulnerabilities across real-world attack scenarios, then submitted a full vulnerability assessment report with findings, attack paths, and remediation, all of which was reviewed by our trainers. We truly appreciate the hard work that went into this. Congratulations on your achievement! Learn more about the 8kSec Certifications: 8ksec.io/certifications
8kSec tweet media
English
0
1
9
826
0xbinder retweetledi
8kSec
8kSec@8kSec·
🚨New Blog Alert: iPhone 17 (A19) introduces Memory Integrity Enforcement (MIE), Apple’s hardware-backed memory tagging integrated into the kernel.We reversed the kernel to see how it actually works 👇 8ksec.io/mie-deep-dive-… Part 1 covers: 🔹A19-only, synchronous tag checks with no runtime overhead 🔹New kernel instructions (irg, stg) replacing software mitigations 🔹Hardware-level defense against tag side channels (TikTag) 🔹How kalloc_type and xzone malloc drive tag enforcement Why it matters: MIE changes kernel RE, crash triage, and exploit viability. Tag mismatches look like crashes, familiar heap primitives fail, and kernel caches now contain instructions most tools don’t explain yet. This blog enables you to quickly identify MIE-related code, interpret new crash signatures, and adjust exploit strategy to the new hardware reality. 👀Stay tuned for Part 2!
8kSec tweet media
English
0
8
42
1.5K
0xbinder retweetledi
PinkDraconian
PinkDraconian@PinkDraconian·
Without @hackthebox_eu, I probably wouldn't be a hacker 🟩 When I was 16 years old, I was infatuated with hacking videos on YouTube and I wanted to learn more, but I never found a great platform to learn. That's until I stumbled upon Hack The Box and it changed my life.
PinkDraconian tweet mediaPinkDraconian tweet media
English
11
10
347
19.6K
0xbinder retweetledi
8kSec
8kSec@8kSec·
If you’re still using pinning to verify device integrity, you’re using the wrong tool for the job. Reverse engineers are bypassing your pins in minutes with Frida, while your actual users are the ones suffering when a CA rotates unexpectedly. This shift in the trust model is a detail most teams are still ignoring. 🔍 This blog explains why: 8ksec.io/why-you-should…
8kSec tweet media
English
1
8
45
2.6K
0xbinder retweetledi
AlternativeTo
AlternativeTo@AlternativeTo·
Download hundreds of open-source Android apps in APK from GitHub and GitLab. All apps are free, tested, privacy-focused, and up-to-date
AlternativeTo tweet media
English
2
114
996
37.3K
0xbinder retweetledi
International Cyber Digest
International Cyber Digest@IntCyberDigest·
‼️Tesla was hacked by researchers who chained two vulnerabilities resulting in total control of Tesla's infotainment system Researchers earned a total of $516,500 after exploiting 37 zero-days on the first day of the Pwn2Own Automotive 2026 competition.
International Cyber Digest tweet media
English
24
207
2.3K
122.4K