@cryptaxUsing AI-assisted decompilation of Radare2A few months ago, Radare2 (aka r2), an open source disassembler which can be entirely used by command line, started implementing AI plugins…15h ago15h ago
@cryptaxDart shifts to standard calling conventionUp until Dart SDK v3.4.0, Dart was using an uncommon calling convention where all arguments for a function were passed on the stack [see my…Jul 19Jul 19
@cryptaxUntangling Android/TangleBotWe dig in a malicious sample of Android/TangleBot of May 2024. TangleBot is also reported as a BankBot, although it is more an Android RAT…Jul 121Jul 121
@cryptaxOn the security of Google SecretsGoogle Secrets Gradle plugin is “for providing your secrets securely to your Android project”. I would like to make it clear in this…Jul 11Jul 11
@cryptaxInside Sinchat Flutter riskwareIn this blog post, we analyze 2 borderline Flutter apps. As I’ll explain in conclusion, they are not malicious but expose borderline/risky…May 24May 24
@cryptaxTesting Restricted Settings of Android 13 on an emulatorAndroid 13 introduced a new security measure called “Restricted Settings”. The measure is meant to limit access to notification settings…Apr 4Apr 4
@cryptaxPhishing attempt on French e-tollsYesterday, I received a well-crafted phishing attempt email targeting users of a French e-toll company. While this email contains no mobile…Mar 21Mar 21
@cryptaxWhat makes a good CTF challenge?A Capture The Flag (CTF) challenge is a specific task or problem designed to test participants’ skills in various areas of cyber-security…Mar 18Mar 18
@cryptaxAndroid/SpyNote bypasses Restricted Settings + breaks many RE toolsToday, I reversed an Android spyware with multiple tricks. The malware has been discovered by @malwrhunterteam 2 days ago.Feb 191Feb 191
@cryptaxA simple infostealer for beginnersMost Android malware are packed and obfuscated nowadays. From time to time, it’s nice to reverse a simple one 😆. This one was found at the…Feb 9Feb 9