generated from Le-pingouin-en-securite/fluffy-palm-tree
-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathdescarga.txt
62 lines (62 loc) · 18.7 KB
/
descarga.txt
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>erev0s.com personal blog page</title><link>http://erev0s.com/</link><description>A blog about cyber security, web development and other tech related topics</description><atom:link href="http://erev0s.com/rss/" rel="self"/><language>en</language><category>python</category><category>django</category><category>cyber security</category><category>android</category><category>hacking</category><copyright>Copyright (c) 2019-2020, erev0s.com</copyright><lastBuildDate>Sat, 18 Nov 2023 16:03:00 +0000</lastBuildDate><item><title>Unmasking Evasive Threats with apkInspector</title><link>https://erev0s.com/blog/unmasking-evasive-threats-with-apkinspector/</link><description><![CDATA[
apkInspector is a tool designed to provide detailed insights into the zip structure of APK files, offering the capability to extract content and decode the AndroidManifest.xml file. <img src="https://erev0s.com/media/images/erev0sFooterLogo.original.png" alt="Unmasking Evasive Threats with apkInspector">
]></description><pubDate>Sun, 12 Nov 2023 14:41:18 +0000</pubDate><guid>https://erev0s.com/blog/unmasking-evasive-threats-with-apkinspector/</guid><category>Android</category><category>Featured</category></item><item><title>Android permissions grouped per API and protection level</title><link>https://erev0s.com/blog/android-permissions-grouped-per-api-and-protection-level/</link><description><![CDATA[
Lists of the Android Permissions grouped together based on protection level, like dangerous or signature or based on the API level they were added on. <img src="https://erev0s.com/media/images/erev0sFooterLogo.original.png" alt="Android permissions grouped per API and protection level">
]></description><pubDate>Tue, 14 Feb 2023 16:53:12 +0000</pubDate><guid>https://erev0s.com/blog/android-permissions-grouped-per-api-and-protection-level/</guid><category>Android</category></item><item><title>Statistics on more than 1 million apps from Google Play Store</title><link>https://erev0s.com/blog/statistics-on-1million-apps-from-google-play-store/</link><description><![CDATA[
What is the average size of a play store app? or the number of permissions requested ? and several other stats shown on an analysis of more than one million apps from Play Store. <img src="https://erev0s.com/media/images/erev0sFooterLogo.original.png" alt="Statistics on more than 1 million apps from Google Play Store">
]></description><pubDate>Tue, 24 Jan 2023 22:12:20 +0000</pubDate><guid>https://erev0s.com/blog/statistics-on-1million-apps-from-google-play-store/</guid><category>Android</category></item><item><title>3 ways for Dynamic Code Loading in Android</title><link>https://erev0s.com/blog/3-ways-for-dynamic-code-loading-in-android/</link><description><![CDATA[
Dynamic code loading in Android, the methods malware employ to hide malicious behaviour. <img src="https://erev0s.com/media/images/erev0sFooterLogo.original.png" alt="3 ways for Dynamic Code Loading in Android">
]></description><pubDate>Sat, 12 Nov 2022 09:42:47 +0000</pubDate><guid>https://erev0s.com/blog/3-ways-for-dynamic-code-loading-in-android/</guid><category>Android</category></item><item><title>Malware Dropper disguised as an Ebay Android App</title><link>https://erev0s.com/blog/malware-dropper-disguised-as-an-ebay-android-app/</link><description><![CDATA[
Analysis on a malware dropper which was disguised as an Ebay Android app, with a lot of features like premium sms, keylogger, overlay attacks. <img src="https://erev0s.com/media/images/erev0sFooterLogo.original.png" alt="Malware Dropper disguised as an Ebay Android App">
]></description><pubDate>Sat, 24 Sep 2022 22:59:24 +0000</pubDate><guid>https://erev0s.com/blog/malware-dropper-disguised-as-an-ebay-android-app/</guid><category>Android</category></item><item><title>Automated security scanning against VAmPI</title><link>https://erev0s.com/blog/vampi-against-automated-api-scanning/</link><description><![CDATA[
How well automated API security scanners work against an already vulnerable API? <img src="https://erev0s.com/media/images/erev0sFooterLogo.original.png" alt="Automated security scanning against VAmPI">
]></description><pubDate>Wed, 20 Apr 2022 20:34:20 +0000</pubDate><guid>https://erev0s.com/blog/vampi-against-automated-api-scanning/</guid><category>Featured</category><category>Security</category></item><item><title>New flag in APKTOOL for automatic generic network configuration</title><link>https://erev0s.com/blog/new-flag-in-apktool-for-automatic-generic-network-configuration/</link><description><![CDATA[
The known apktool, just got a slight upgrade to include a new flag, allowing it to automatically embed a generic/permissive network configuration. <img src="https://erev0s.com/media/images/erev0sFooterLogo.original.png" alt="New flag in APKTOOL for automatic generic network configuration">
]></description><pubDate>Fri, 20 May 2022 12:00:39 +0000</pubDate><guid>https://erev0s.com/blog/new-flag-in-apktool-for-automatic-generic-network-configuration/</guid><category>Android</category></item><item><title>InsecureShop Write-up, all vulnerabilities explained</title><link>https://erev0s.com/blog/insecureshop-write-up-all-vulnerabilities-explained/</link><description><![CDATA[
A full write-up for the InsecureSHop application, to serve for learning purposes <img src="https://erev0s.com/media/images/erev0sFooterLogo.original.png" alt="InsecureShop Write-up, all vulnerabilities explained">
]></description><pubDate>Sun, 17 Oct 2021 12:59:40 +0000</pubDate><guid>https://erev0s.com/blog/insecureshop-write-up-all-vulnerabilities-explained/</guid><category>Writeups</category><category>Android</category></item><item><title>Exploiting content providers through an insecure SetResult implementation</title><link>https://erev0s.com/blog/exploiting-content-providers-through-an-insecure-setresult-implementation/</link><description><![CDATA[
How an insecure implementation of SetResult can lead to exploitation of the available content providers. <img src="https://erev0s.com/media/images/erev0sFooterLogo.original.png" alt="Exploiting content providers through an insecure SetResult implementation">
]></description><pubDate>Tue, 12 Oct 2021 15:21:46 +0000</pubDate><guid>https://erev0s.com/blog/exploiting-content-providers-through-an-insecure-setresult-implementation/</guid><category>Writeups</category><category>Android</category></item><item><title>AWS Cognito Misconfigurations in Android Apps</title><link>https://erev0s.com/blog/aws-cognito-misconfigurations-in-android-apps/</link><description><![CDATA[
Learn how an AWS Cognito Identity Pool can be identified in an APK and then checked if it is misconfigured. <img src="https://erev0s.com/media/images/erev0sFooterLogo.original.png" alt="AWS Cognito Misconfigurations in Android Apps">
]></description><pubDate>Thu, 23 Sep 2021 19:39:59 +0000</pubDate><guid>https://erev0s.com/blog/aws-cognito-misconfigurations-in-android-apps/</guid><category>Writeups</category><category>Android</category><category>Scripts</category></item><item><title>Statistics from the Static and Dynamic analysis of more than 14,000 APKs from Play Store</title><link>https://erev0s.com/blog/statistics-from-the-static-and-dynamic-analysis-of-more-than-14000-apks-from-play-store/</link><description><![CDATA[
A presentation of the statistics from an analysis of more than 14,000 APKs, as part of an experiment. <img src="https://erev0s.com/media/images/erev0sFooterLogo.original.png" alt="Statistics from the Static and Dynamic analysis of more than 14,000 APKs from Play Store">
]></description><guid>https://erev0s.com/blog/statistics-from-the-static-and-dynamic-analysis-of-more-than-14000-apks-from-play-store/</guid><category>Android</category></item><item><title>Reversing an Android APK using ASM library</title><link>https://erev0s.com/blog/reversing-an-android-apk-using-asm-library/</link><description><![CDATA[
A quick guide on how to instrument an Android APK with the help of the ASM library and extract information from it <img src="https://erev0s.com/media/images/erev0sFooterLogo.original.png" alt="Reversing an Android APK using ASM library">
]></description><pubDate>Sat, 12 Jun 2021 11:44:17 +0000</pubDate><guid>https://erev0s.com/blog/reversing-an-android-apk-using-asm-library/</guid><category>Android</category></item><item><title>How to download 1000 (or more) Apps from Play Store?</title><link>https://erev0s.com/blog/how-download-1000-or-more-apps-play-store/</link><description><![CDATA[
See how you can download hunderds of apps from Play Store automatically! <img src="https://erev0s.com/media/images/erev0sFooterLogo.original.png" alt="How to download 1000 (or more) Apps from Play Store?">
]></description><pubDate>Sat, 12 Dec 2020 12:06:45 +0000</pubDate><guid>https://erev0s.com/blog/how-download-1000-or-more-apps-play-store/</guid><category>Android</category></item><item><title>VAmPI the vulnerable API for security testing</title><link>https://erev0s.com/blog/vampi-vulnerable-api-security-testing/</link><description><![CDATA[
Vulnerable REST API with OWASP top 10 vulnerabilities for APIs <img src="https://erev0s.com/media/images/erev0sFooterLogo.original.png" alt="VAmPI the vulnerable API for security testing">
]></description><pubDate>Sun, 04 Oct 2020 19:53:23 +0000</pubDate><guid>https://erev0s.com/blog/vampi-vulnerable-api-security-testing/</guid><category>Featured</category><category>Security</category></item><item><title>SSH Local, Remote and Dynamic Port Forwarding - Explain it like I am five!</title><link>https://erev0s.com/blog/ssh-local-remote-and-dynamic-port-forwarding-explain-it-i-am-five/</link><description><![CDATA[
What are the differences in between ssh local, remote and dynamic port forwarding and when to use which? Explain it like I am five with pictures and examples! <img src="https://erev0s.com/media/images/erev0sFooterLogo.original.png" alt="SSH Local, Remote and Dynamic Port Forwarding - Explain it like I am five!">
]></description><pubDate>Tue, 20 Oct 2020 18:44:35 +0000</pubDate><guid>https://erev0s.com/blog/ssh-local-remote-and-dynamic-port-forwarding-explain-it-i-am-five/</guid><category>Educational</category></item><item><title>Run an Android Service in the background reliably every N seconds</title><link>https://erev0s.com/blog/run-android-service-background-reliably-every-n-seconds/</link><description><![CDATA[
How to make an android service to run in the background reliably every N seconds even when the device is idle. <img src="https://erev0s.com/media/images/erev0sFooterLogo.original.png" alt="Run an Android Service in the background reliably every N seconds">
]></description><pubDate>Sun, 02 Aug 2020 19:29:09 +0000</pubDate><guid>https://erev0s.com/blog/run-android-service-background-reliably-every-n-seconds/</guid><category>Android</category></item><item><title>Create your RSS/Atom feed in Wagtail</title><link>https://erev0s.com/blog/create-your-rssatom-feed-wagtail/</link><description><![CDATA[
See how to create your own RSS/Atom feed in your Wagtail site fast and easy. <img src="https://erev0s.com/media/images/erev0sFooterLogo.original.png" alt="Create your RSS/Atom feed in Wagtail">
]></description><pubDate>Wed, 24 Jun 2020 13:52:10 +0000</pubDate><guid>https://erev0s.com/blog/create-your-rssatom-feed-wagtail/</guid><category>Web Development</category></item><item><title>Encrypted Bind and Reverse Shells with Socat (Linux/Windows)</title><link>https://erev0s.com/blog/encrypted-bind-and-reverse-shells-socat/</link><description><![CDATA[
Encrypt your traffic with openssl when using bind or reverse shells. <img src="https://erev0s.com/media/images/erev0sFooterLogo.original.png" alt="Encrypted Bind and Reverse Shells with Socat (Linux/Windows)">
]></description><pubDate>Wed, 03 Jun 2020 13:03:32 +0000</pubDate><guid>https://erev0s.com/blog/encrypted-bind-and-reverse-shells-socat/</guid><category>Hacking/Cracking</category></item><item><title>3 ways to detect the SELinux status in Android natively</title><link>https://erev0s.com/blog/3-ways-detect-selinux-status-android-natively/</link><description><![CDATA[
Are you curious about how to detect the SELinux status of an Android device using native code (C) ? <img src="https://erev0s.com/media/images/erev0sFooterLogo.original.png" alt="3 ways to detect the SELinux status in Android natively">
]></description><pubDate>Sat, 23 May 2020 09:13:49 +0000</pubDate><guid>https://erev0s.com/blog/3-ways-detect-selinux-status-android-natively/</guid><category>Android</category></item><item><title>Tiny AES in CBC mode with PKCS7 padding written in C</title><link>https://erev0s.com/blog/tiny-aes-cbc-mode-pkcs7-padding-written-c/</link><description><![CDATA[
An example on how to use Tiny AES in CBC mode with PKCS7 padding written in C <img src="https://erev0s.com/media/images/erev0sFooterLogo.original.png" alt="Tiny AES in CBC mode with PKCS7 padding written in C">
]></description><pubDate>Wed, 29 Apr 2020 22:38:30 +0000</pubDate><guid>https://erev0s.com/blog/tiny-aes-cbc-mode-pkcs7-padding-written-c/</guid><category>Scripts</category></item><item><title>Convert APK to source code automatically with lazyX</title><link>https://erev0s.com/blog/convert-apk-source-code-automatically-lazyx/</link><description><![CDATA[
A python script to automate the use of dex2jar tool along with cfr in order to decompile apk files instantly. <img src="https://erev0s.com/media/images/erev0sFooterLogo.original.png" alt="Convert APK to source code automatically with lazyX">
]></description><pubDate>Sun, 29 Mar 2020 12:31:03 +0000</pubDate><guid>https://erev0s.com/blog/convert-apk-source-code-automatically-lazyx/</guid><category>Android</category><category>Scripts</category><category>Featured</category></item><item><title>How to hook Android Native methods with Frida (Noob Friendly)</title><link>https://erev0s.com/blog/how-hook-android-native-methods-frida-noob-friendly/</link><description><![CDATA[
Hooking C/C++ code in Android application using Frida with introduction and explainations in every step - noob friendly <img src="https://erev0s.com/media/images/erev0sFooterLogo.original.png" alt="How to hook Android Native methods with Frida (Noob Friendly)">
]></description><pubDate>Sun, 22 Mar 2020 21:03:43 +0000</pubDate><guid>https://erev0s.com/blog/how-hook-android-native-methods-frida-noob-friendly/</guid><category>Android</category></item><item><title>Wagtail list of Tips and Tricks!</title><link>https://erev0s.com/blog/wagtail-list-tips-and-tricks/</link><description><![CDATA[
Tips and tricks in Wagtail that will help you tweak the appearance and functionality. <img src="https://erev0s.com/media/images/erev0sFooterLogo.original.png" alt="Wagtail list of Tips and Tricks!">
]></description><pubDate>Sun, 29 Mar 2020 10:49:38 +0000</pubDate><guid>https://erev0s.com/blog/wagtail-list-tips-and-tricks/</guid><category>Web Development</category></item><item><title>Add JNI(C/C++) into your existing Android app</title><link>https://erev0s.com/blog/add-jnicc-your-existing-android-app/</link><description><![CDATA[
How to add C/C++ through the JNI, into an existing Android app either with the source code or directly the compiled .so files. <img src="https://erev0s.com/media/images/erev0sFooterLogo.original.png" alt="Add JNI(C/C++) into your existing Android app">
]></description><pubDate>Tue, 17 Mar 2020 18:43:56 +0000</pubDate><guid>https://erev0s.com/blog/add-jnicc-your-existing-android-app/</guid><category>Android</category></item><item><title>Gobuster for directory, DNS and virtual hosts bruteforcing</title><link>https://erev0s.com/blog/gobuster-directory-dns-and-virtual-hosts-bruteforcing/</link><description><![CDATA[
A penetration testing bruteforcing tool running in cli with support for directories, DNS and virtual hosts. <img src="https://erev0s.com/media/images/erev0sFooterLogo.original.png" alt="Gobuster for directory, DNS and virtual hosts bruteforcing">
]></description><pubDate>Sat, 15 Feb 2020 11:30:22 +0000</pubDate><guid>https://erev0s.com/blog/gobuster-directory-dns-and-virtual-hosts-bruteforcing/</guid><category>Hacking/Cracking</category></item><item><title>Mango - Hack the Box - Writeup</title><link>https://erev0s.com/blog/mango-hack-box-writeup/</link><description><![CDATA[
A writeup for the machine Mango from hackthebox.eu with medium Difficulty <img src="https://erev0s.com/media/images/erev0sFooterLogo.original.png" alt="Mango - Hack the Box - Writeup">
]></description><pubDate>Sat, 18 Jan 2020 12:15:01 +0000</pubDate><guid>https://erev0s.com/blog/mango-hack-box-writeup/</guid><category>Writeups</category></item><item><title>OpenAdmin - Hack the Box - Writeup</title><link>https://erev0s.com/blog/openadmin-hack-box-writeup/</link><description><![CDATA[
A writeup for the machine OpenAdmin from hackthebox.eu. Difficulty = Easy <img src="https://erev0s.com/media/images/erev0sFooterLogo.original.png" alt="OpenAdmin - Hack the Box - Writeup">
]></description><pubDate>Sun, 12 Jan 2020 16:53:02 +0000</pubDate><guid>https://erev0s.com/blog/openadmin-hack-box-writeup/</guid><category>Writeups</category></item><item><title>Crack password protected SSH keys with John</title><link>https://erev0s.com/blog/crack-password-protected-ssh-keys-john/</link><description><![CDATA[
Learn how to crack a password protected ssh key (id_rsa) using John the Ripper. <img src="https://erev0s.com/media/images/erev0sFooterLogo.original.png" alt="Crack password protected SSH keys with John">
]></description><pubDate>Sun, 12 Jan 2020 17:34:36 +0000</pubDate><guid>https://erev0s.com/blog/crack-password-protected-ssh-keys-john/</guid><category>Hacking/Cracking</category></item><item><title>Cracking /etc/shadow with John</title><link>https://erev0s.com/blog/cracking-etcshadow-john/</link><description><![CDATA[
Learn how to crack /etc/shadow file using John the Ripper. <img src="https://erev0s.com/media/images/erev0sFooterLogo.original.png" alt="Cracking /etc/shadow with John">
]></description><pubDate>Thu, 09 Jan 2020 16:03:05 +0000</pubDate><guid>https://erev0s.com/blog/cracking-etcshadow-john/</guid><category>Hacking/Cracking</category></item><item><title>Obscurity - Hack the Box - Writeup</title><link>https://erev0s.com/blog/obscurity-hack-box-writeup/</link><description><![CDATA[
A writeup for the machine Obscurity from hackthebox.eu with medium Difficulty. <img src="https://erev0s.com/media/images/erev0sFooterLogo.original.png" alt="Obscurity - Hack the Box - Writeup">
]></description><pubDate>Tue, 07 Jan 2020 17:56:11 +0000</pubDate><guid>https://erev0s.com/blog/obscurity-hack-box-writeup/</guid><category>Writeups</category></item></channel></rss>