Categories
Tags
8ksec 8ksec.io aidl android anti-debug anti-frida anti-hook APK broadcast-receiver bypass CC certification config content-provider CTF ctf cybersecurity cybertalents deep-links deeplink dex dexclassloader dylib dynamic-analysis dynamic-loading emulator exam exploitation file-encryption florida flutter frida ghidra hamida hextree.io hook hooking http-security ios ipc ISC2 jailbreak-detection Kali kiosk-mode logic-bug mobile mobile-exploitation native network-interception pentest plugin privacy proxy-detection python rce reverse-engineering runtime script security smali sql-injection static-analysis swift tls-pinning token-extraction url-parsing url-scheme vulnerability web webview writeup WSL2
2026
14 posts
04-26
Part 2 — Coming Soon
03-03
Patch 11 — Renaming the `frida-gum` Thread Pool
03-02
Patch 10 — Disabling Frida's Own Anti-Anti-Frida Logic
03-01
Patch 9 — Renaming the `jit-cache` memfd Descriptor
02-28
Patch 8 — Renaming the `pool-frida` Thread Pool
02-27
Patch 7 — Automating the Double-Encoding with a Python Script
02-26
Patch 6 — Removing the `FRIDA:UNEXPECTED` Protocol Error Marker
02-25
Patch 4 — Hiding the `gum-js-loop` Thread Name
02-25
Patch 5 — Hiding the `gmain` Thread Name
02-24
Patch 3 — Renaming the `frida_agent_main` Exported Symbol
02-22
Patch 2 — Randomizing the `frida-agent-<arch>.so` Filename on Disk
02-21
Part 1 — Florida Patches
02-21
Patch 1 — Obfuscating the `frida:rpc` Protocol Identifier String
02-20
The Way to Hamida: Frida Artifacts
2025
9 posts
11-28
Advanced Frida Detection Bypass
11-17
Challenge 04: ClearRoute
11-15
Challenge 02: SwizzleMeTimbers
11-14
Challenge 01: FridaInTheMiddle
09-09
Challenge 02: No Escape
09-08
Challenge 01: FactsDroid
09-08
Challenge 01: Captain Nohook
08-26
Brod & Co. — Android CTF Writeup (BrunnerCTF 2025)
08-05
Arab Wargames 2025 - Android Challenges Writeup