MobileHackingLab

50 posts

MobileHackingLab banner
MobileHackingLab

MobileHackingLab

@MobileHackLab

Mastering Mobile Security! Specialized in iOS & Android exploit development and vulnerability research. Offensive mobile training and Arm64 lab environment

Katılım Ocak 2023
5 Takip Edilen432 Takipçiler
MobileHackingLab
MobileHackingLab@MobileHackLab·
RT @mnkbuddh: A CFO approved a $25M wire transfer last year. The person on the call was a deepfake. We are not ready for what AI attackers…
English
0
1
0
14
MobileHackingLab retweetledi
Z4N
Z4N@aifaysnami·
Thank you so much @MobileHackLab for the giveaway. Really appreciate it. You guys rock!!!
Z4N tweet media
English
0
2
4
127
MobileHackingLab retweetledi
m@the
m@the@ma4the·
Enjoyed yesterday! Great conference and Great CTF Thanks for everything @MobileHackLab
m@the tweet mediam@the tweet mediam@the tweet media
English
0
1
3
494
MobileHackingLab retweetledi
Mobile Hacker
Mobile Hacker@androidmalware2·
FIRST Ever Online Mobile Hacking Conference Free, worldwide online event bringing the mobile security community together for sessions on mobile hacking, AI, malware, forensics, live mobile‑focused CTF with prizes! When: March 3 and 4, 2026 Register here: mobilehackinglab.com/mobile-hacking…
Mobile Hacker tweet media
English
2
71
364
18K
MobileHackingLab
MobileHackingLab@MobileHackLab·
😨 From JSInterface bug to 1-click RCE and a 5-figure bounty... A while ago, our teammate Lyes found a vulnerability in an Android app that eventually earned a 5 figure bug bounty payout. Finding and validating the full chain manually took ~4 days, which later sparked a simple question. 👇 How much time would this take using Djini.ai? In the blog post, Lyes walks through both perspectives. First, the exploit chain as it was pieced together manually. Then, how the same risky surface surfaced again when retraced with Djini, but in significantly less time. 👉 Full write-up: lnkd.in/eNHkFMM8
MobileHackingLab tweet media
English
0
5
6
739
MobileHackingLab
MobileHackingLab@MobileHackLab·
🚨 DJINI.AI IS LIVE! NEW website. NEW interface. And NEW crazy subscriptions with complementary MHL courses included! AI agents now help you: ⚡ static + dynamic testing, automated ⚡ fuzz native interfaces & JNI ⚡ auto-collect evidence + reports - incl. screenshots ⚡ logically click through flows for you ⚡ explore real app behavior (iOS & Android) - Visual Intelligence Want to win FREE access? Comment on our LinkedIn launch post 👇 linkedin.com/feed/update/ur…
English
0
2
4
280
MobileHackingLab
MobileHackingLab@MobileHackLab·
🚨𝗡𝗲𝘄 𝗠𝗼𝗱𝘂𝗹𝗲 𝗖𝗼𝗺𝗶𝗻𝗴: 𝗦𝗰𝘂𝗱𝗼 𝗛𝗘𝗔𝗣 𝗘𝘅𝗽𝗹𝗼𝗶𝘁𝗮𝘁𝗶𝗼𝗻 Scudo replaced the heap. Hardening went up. Old patterns stopped working. A Scudo Exploitation module is dropping in the coming weeks for Android Userland Fuzzing & Exploitation. Already enrolled? Lifetime access applies. Enroll now, get access at drop 👇 mobilehackinglab.com/afe-promo
English
0
2
4
181
MobileHackingLab retweetledi
my_cybercamp
my_cybercamp@CybercampMY·
📱 Sponsor alert! @MobileHackLab joins #MCC2025 as a Community Hacker sponsor 🎉 They’re giving away Android course vouchers + exam attempts! Pro tip 👉 Attend the Android Workshop @ MCC2025 to get a head start 🚀 🔗 linkedin.com/feed/update/ur…
my_cybercamp tweet media
English
0
6
12
1.2K
MobileHackingLab retweetledi
Akanbi Oluwakunle Johnson
Akanbi Oluwakunle Johnson@akanbi_kunle·
Misconfigured exported services can be exploited for privilege Escalation, data leakage or remote code execution. Is a serious risk for Mobile application. #MAPT @MobileHackLab it’s a great platform to learn 💜💜
English
1
1
4
542
MobileHackingLab retweetledi
YoKo Kho
YoKo Kho@YoKoAcc·
Bismillah. Releasing a new blog on “Exploiting Unsanitized URL Handling and SQL Injection through Deep Links” -> Write-up of Flipcoin Lab for iOS, from @MobileHackLab. @YoKoKho/exploiting-unsanitized-url-handling-sql-injection-via-deep-links-in-ios-app-write-up-of-flipcoin-066899b09fc2" target="_blank" rel="nofollow noopener">medium.com/@YoKoKho/explo…
English
4
67
256
13.3K
MobileHackingLab retweetledi
YoKo Kho
YoKo Kho@YoKoAcc·
Bismillah. Releasing a new blog on “Bypassing iOS Jailbreak Detection by Patching the Binary with Ghidra” -> Write-up of No Escape Lab from @MobileHackLab. @YoKoKho/bypassing-ios-jailbreak-detection-by-patching-the-binary-with-ghidra-write-up-of-no-escape-lab-02b417b3a235" target="_blank" rel="nofollow noopener">medium.com/@YoKoKho/bypas… Note: If you’re already familiar with the fundamentals, just please jump straight to Chapter 4.4.
English
2
66
243
10K
sehno
sehno@_sehno_·
It's done ! I've passed the Android Fuzzer and Exploit Developer certification exam from @MobileHackLab ! 🎉
sehno tweet media
English
2
1
10
1K