Bug Bounty Guide and Examples

Basically, this webpage is just for record of useful links that I have found.

Android testing - https://github.com/muellerberndt/android_app_security_checklistarrow-up-right

Android report and resources - https://github.com/B3nac/Android-Reports-and-Resourcesarrow-up-right

Intentionally vulnerable app - https://hacker-gadgets.com/blog/2021/07/20/allsafe-intentionally-vulnerable-android-application/arrow-up-right

Drozer Walkthrough - https://resources.infosecinstitute.com/topic/android-penetration-tools-walkthrough-series-drozer/arrow-up-right

Hackerone report 1 - https://hackerone.com/reports/291764arrow-up-right

Pentest using Frida - https://notsosecure.com/pentesting-android-apps-using-fridaarrow-up-right

Privledge escalation through intents android - https://github.com/d9w/6858-android-intentsarrow-up-right

Hackerone Report 2 - https://hackerone.com/reports/431002arrow-up-right

hackerone report 3 - https://hackerone.com/reports/97295arrow-up-right

hackerone report 4 - https://hackerone.com/reports/289000arrow-up-right

Export webview - https://medium.com/mobis3c/exploiting-android-webview-vulnerabilities-e2bcff780892arrow-up-right

Exploiting Broadcast recievers - https://resources.infosecinstitute.com/topic/android-hacking-security-part-3-exploiting-broadcast-receivers/arrow-up-right

Android Root detection bypass - https://gowthamr1.medium.com/android-root-detection-bypass-using-objection-and-frida-scripts-d681d30659a7arrow-up-right

Beginner guide to mobile security - https://rajatrao-13.github.io/learning/2020/06/10/Mobile-Security/#/arrow-up-right

Exploiting Android Memory corruption - https://blog.oversecured.com/Exploiting-memory-corruption-vulnerabilities-on-Android/arrow-up-right

Last updated