A redfox Cybersecurity blog on using iOS pentesting with Objection.

iOS Pen Testing with Objection

In the realm of mobile app security, iOS penetration testing plays a pivotal role in identifying and mitigating vulnerabilities. This comprehensive guide combines iOS vulnerabilities

Read More »
A redfox Cybersecurity blog on different methods and techniques to exploit Android activities

How to Exploit Android Activities?

This blog will explore different methods and techniques to exploit Android activities with the “exported=true” attribute set. By understanding the vulnerabilities associated with this attribute,

Read More »