🧠 Staycyonline Knowledge Base

            • 1. Intro to AWS
            • Level 1 - buckets of fun
            • Level 2
            • Level 3
            • Learnings from Humla session 1 june
          • IAM
          • Azure Cli and Powershell
          • enumeration
          • Initial research
          • Thunder CTF
        • Active Information Gathering
        • Active Information Gathering 1
        • ARP Poisoning
        • Blue Keep
        • Bug bounty mistakes-tips
        • Credential Stuffing
        • Cross site request forgery - CSRF
        • Cross site Scripting - XSS
        • CSRF in JSON body
        • Email OSINT (Recon)
        • Eternal Blue
        • Filtering basics - with TShark
        • FTP
        • FTP - Port 21
        • FTP - Port 21 - Enumeration
        • FTP - Port 21 - Exploitation
        • HTTP
        • JWT
        • Mapping a Network
        • Mapping a Network 1
        • Metasploit framework
        • Microsoft IIS
        • MSFVenom Cheat sheet
        • Oauth
        • Open URL Redirects
        • owasp zap + burp
        • Passive Information Gathering
        • Passive Information Gathering 1
        • Password breaches
        • Port 21 FTP
        • Port 22 SSH Enum and Attacking
        • Port 80 - http
        • Port 139,445 - SMB
        • Port 873 - rsync
        • Port 3389 - RDP
        • Port 6379 - Redis caching servers
        • Port 27017 - Mongodb
        • Race conditions
        • RDP
        • Resources
        • Reverse shell vs bind shell
        • SMB
        • SMB Basics
        • SMB relay attacks
        • SQL
        • SSH
        • Staged vs Non staged payloads
        • Telnet
        • Tshark
        • Web in depth
        • xss payloads
        • Commonly exploited linux vuln
        • Cron Job exploitation
        • Dirty Pipe (CVE-2022-0847)
        • Downloading files
        • Exploiting Bash
        • Exploiting SUID binaries
        • Linux - Enumeration
        • Linux - Privilege Escalation
        • Linux Cred Dumping
        • Linux Kernel exploits
        • ⚠️ Bashed
        • ✋Brainfuck (on hold as it is confusing)
        • 🗂️Index of HTB Writeups
        • Blue ✅⁉️
        • Devel
        • Editorial
        • Fawn
        • LAME ✅
        • Legacy✅
        • Nibbles
        • permX
        • Pilgrimage
        • Sense✅
        • Sunday ✅
        • TenTen
        • TenTen 1
        • TwoMillion
        • Access Control Model
        • AD Defense
        • Domain Enumeration
        • Domain Enumeration using Bloodhound
        • Enumeration Cheatsheet AD
        • Group Policy
        • Introduction to Active Directory
        • LLMNR Poisoning
        • Local Privilage Escalation
        • Local Privilage Escalation Cheatsheet
        • Local Privilege Escalation
        • Microsoft AD Module
        • Password Cracking with Hashcat
        • Powerview
        • Privilage Escalation using Feature Abuse
        • Privilege Escalation using Feature Abuse
        • Trusts
        • Az 900
        • Activities
        • Android App Components
        • Android Applications
        • Android Architcture
        • Android Dynamic analysis
        • Android Manifest.xml
        • Android red team
        • Android Static Analysis
        • Architecture
        • Broadcast Recievers
        • Certificate transparancy issue
        • Connecting Vitrual VM to a Physical Android Device over adb
        • Content providers
        • Humla android workshop
        • Injured Android Walkthrough
        • Intent Filters
        • Intents
        • Mobile Application Pentesting Process
        • Patching an app manually
        • Pentest process
        • Pentest process 1
        • Possible issues
        • Pull Apps from Playstore
        • Resources
        • Services
        • Shared Preferences
        • Signatures in Android App
        • Apps
        • Burp Mobile assistant
        • Emulator Options
        • Frida and objection
        • Getting IPA files
        • Installing ipa files directly
        • ios Architecture
        • ios filesystem
        • Jailbreaking - Notes and Resources
        • Lab Setup
        • Learnings from Null Humla Session Blr - 01 Feb 2025
        • Objection on ipa - patching
        • Proxyman (Alternative to burp)
        • setting up mac os on VM
        • Static Analysis
        • API Active Recon
        • API Authentication Attacks
        • API Authorization Attacks
        • API Passive Recon
        • API Recon
        • Combining techniques
        • Content type vulnerabilities
        • Evasive Measures
        • Excessive Data Exposure
        • GraphQL - Humla
        • Improper Asset Management
        • Injection Attacks
        • Mass Assignment Attack
        • Methodology - Checklist
        • Reverse Engineering an API
        • scan with zap (manual)
        • SSRF
        • Tools
        • Vulns
        • X forwarded for header to bypass auth
        • Code review
        • 1 Intro
        • 2 Elements of a prompt
        • 3. Use case
        • Offensive Approach
        • Docker Basics
        • Hacking docker
        • Humla container sec
        • API Integration Patterns
        • Building an Identity Architecture
        • Federation
        • Alternate data streams
        • Dumping hashes with Mimikatz
        • Kernel Explots - Win Priv Esc
        • Microsoft IIS + Webdav
        • Pass the hash
        • Searching for passwords in windows config files
        • UAC Bypass
        • Windows
        • Windows - Privilege Escalation 1
        • Windows Access Tokens - Token Impersonation
        • Windows Password Hashes
        • WINRM
      • Engineering Blogs links
      • Iot hacking bsides notes
      • Knowledge Store
      • Learnings from Source code review null humla - 12th May 2024
      • Tools you need for Bug Bounty
      • Tunneling Traffic via SSH
      • Dataview
      • Excalibrain
      • Excalidraw
      • Leaflet
      • What is this❓
      • Productivity
      • Random Business Knowledge
      • Learnings from Zseano's methodology
      • Life is short - So is this book
      • grading
      • Settings for reels
      • tips
        • 1. Installation
        • 2. Hello World
        • 3. Functions, Macros, Comments and Errors
      • Algorithm design techniques
      • Asymptotic Notation
        • 🗂️ TEMPLATE - INDEX
        • Note Template
        • Plan to learn template
        • Quick note template
        • Basic note
        • Dataview queries
        • Using leaflet plugin
      • [[Pasted image 20240501070706.png
      • 2025-03-05
      • Learnings
      • Make myself better
      • Tunneling
    Home

    ❯

    👽 Security

    ❯

    📱Android

    Folder: 👽-Security/📱Android

    27 items under this folder.

    • Jul 13, 2025

      Android App Components

      • android
      • mobile
      • bug-bounty
      • hacking
    • Jul 13, 2025

      Android Applications

      • android
      • mobile
      • bug-bounty
      • mobexler
      • hacking
    • Jul 13, 2025

      Android Architcture

      • android
      • architecture
      • mobile
      • hacking
      • bug-bounty
      • system
      • security
    • Jul 13, 2025

      Android Dynamic analysis

      • Jul 13, 2025

        Android Manifest.xml

        • android
        • mobile
        • hacking
        • bug-bounty
      • Jul 13, 2025

        Android Static Analysis

        • Jul 13, 2025

          Android red team

          • Jul 13, 2025

            Architecture

            • Jul 13, 2025

              Broadcast Recievers

              • android
              • mobile
              • bug-bounty
              • hacking
            • Jul 13, 2025

              Certificate transparancy issue

              • Jul 13, 2025

                Connecting Vitrual VM to a Physical Android Device over adb

                • android
                • adb
                • hacking
                • setup
                • mobile
                • remote-machine
                • virtualbox
                • mobexler
                • bug-bounty
                • lab
              • Jul 13, 2025

                Content providers

                • android
                • mobile
                • bug-bounty
                • hacking
              • Jul 13, 2025

                Humla android workshop

                • Jul 13, 2025

                  Injured Android Walkthrough

                  • Jul 13, 2025

                    Intent Filters

                    • Jul 13, 2025

                      Intents

                      • android
                      • mobile
                      • bug-bounty
                      • hacking
                    • Jul 13, 2025

                      Mobile Application Pentesting Process

                      • Jul 13, 2025

                        Patching an app manually

                        • Jul 13, 2025

                          Pentest process 1

                          • Jul 13, 2025

                            Pentest process

                            • Jul 13, 2025

                              Possible issues

                              • Jul 13, 2025

                                Pull Apps from Playstore

                                • Jul 13, 2025

                                  Resources

                                  • Jul 13, 2025

                                    Services

                                    • android
                                    • mobile
                                    • bug-bounty
                                    • hacking
                                  • Jul 13, 2025

                                    Shared Preferences

                                    • android
                                    • mobile
                                    • bug-bounty
                                    • hacking
                                  • Jul 13, 2025

                                    Signatures in Android App

                                    • signature
                                    • android
                                    • mobile
                                    • bug-bounty
                                    • hacking
                                    • tools
                                  • Jul 13, 2025

                                    Activities

                                    • android
                                    • mobile
                                    • bug-bounty
                                    • hacking

                                  Created with Quartz v4.4.0 © 2025

                                  • GitHub
                                  • Discord Community