Site search

Search results: «MobSF»

Found matches: 3

MobSF has Stored XSS via Manifest Analysis - Dialer Code Host Field

A Stored Cross-site Scripting (XSS) vulnerability in MobSF's Android manifest analysis allows an attacker to execute arbitrary JavaScript in the context of a victim's browser session by uploading a malicious APK. The android:host attribute from <data android:scheme="android_secret_code"> elements is rendered in HTML reports without sanitization, enabling session hijacking and account takeover.

https://github.com/advisories/GHSA-8hf7-h89p-3pqj

⚠️ WARNING: LEGAL DISCLAIMER

This tool is intended for educational purposes only. The author is not responsible for any illegal use of this tool. Users aresolely responsible for their actions.

#kalilinux #kalilinuxtools #informationsecurity #ethicalhacker #pentesting #Ubuntu...
🛠️ Top 10 Mobile Penetration Testing Tools for Ethical Hackers

Mobile app security gets easier when you follow a repeatable workflow: triage fast, reverse with clarity, validate at runtime, and confirm what the app really sends over the network. 🔎📱

This carousel covers a practical stack used by many AppSec teams:

1) MobSF – automated static + dynamic analysis with clear, exportable reports

2) Frida – dynamic instrumentation for deep runtime visibility

3) Objection – Frida-powered mobile exploration with ready-to-use commands

4) mitmproxy – intercept, inspect, and replay HTTP(S) traffic with scripting

5) apk-mitm – automates APK prep so HTTPS...
MobSF has Stored XSS via Manifest Analysis - Dialer Code Host Field

A Stored Cross-site Scripting (XSS) vulnerability in MobSF's Android manifest analysis allows an attacker to execute arbitrary JavaScript in the context of a victim's browser session by uploading a malicious APK. The android:host attribute from <data android:scheme="android_secret_code"> elements is rendered in HTML reports without sanitization, enabling session hijacking and account takeover.

https://github.com/advisories/GHSA-8hf7-h89p-3pqj

⚠️ WARNING: LEGAL DISCLAIMER

This tool is intended for educational purposes only. The author is not responsible for any illegal use of this tool. Users aresolely responsible for their actions.

#kalilinux #kalilinuxtools #informationsecurity #ethicalhacker #pentesting #Ubuntu...