Posts by Category


How a double-free bug in WhatsApp turns to RCE

  14 minute read

In this blog post, I’m going to share about a double-free vulnerability that I discovered in WhatsApp for Android, and how I turned it into an RCE. I informe...

DoS Wechat with an emoji

  1 minute read

This DoS bug was reported to Tencent, but they decided not to fix because it’s not critical. The Common Vulnerabilities and Exposures (CVE) Program has assig...

Install a trusted CA in Android N

  1 minute read

It’s very trivial to install a user-trusted certificate on Android. Under Settings -> Security you can install new trusted certificates. However, this cre...

Useful Magisk modules

  less than 1 minute read

MagiskHide Props Config Even on a rooted Android phones, you won’t be able to debug your apps if they are built as non-debuggable. In order to work around th...

Frida cheat sheet

  6 minute read

Frida is particularly useful for dynamic analysis on Android/iOS/Windows applications. It allows us to set up hooks on the target functions so that we can in...

Back to Top ↑



  2 minute read

LFI happens when an PHP page explicitly calls include function to embed another PHP page, which can be controlled by the attacker. For example, addguestbook....

Transfer files from Kali to the target machine

  1 minute read

Tranfer files to the target machine is particularly useful when we have already had a reverse shell on Windows. Windows does not have convenient commands to ...

Back to Top ↑


RB App Checker

  less than 1 minute read

This tiny yet powerful app lets us check the iOS application for the certificates, requirements and entitlements, embedded provisioning profiles, auxiliary e...

Handy Android code snippets

  less than 1 minute read

This blog post is a memo of handy Android code snippets that I found particularly useful in programming and hacking.

Back to Top ↑