SkillAgentSearch skills...

AndroidSecNotes

An actively maintained, Self curated notes related to android application security for security professionals, bugbounty hunters, pentesters, reverse engineer, and redteamers.

Install / Use

/learn @iamsarvagyaa/AndroidSecNotes
About this skill

Quality Score

0/100

Supported Platforms

Universal

README

<div align="center"> <a href="https://github.com/iamsarvagyaa/AndroidSecNotes"><img src="static/cover.png" alt="Android Security Notes"></a><br/> </div> <p align="center"> <a href="#getting-started">Getting Started?</a> » <a href="https://www.buymeacoffee.com/iamsarvagyaa">Buy me a coffee</a> » <a href="#contact-me">Wanna Talk?</a></a> </p>

:rocket: Android Security Notes? » Here, You will find important concepts, resources, hand-crafted and self-curated notes written by a kind-hearted fellow. The main purpose of this project is to serve as a First-Aid to newbies (like me) and intermediate peep who perform android security.

:handshake: Wanna contribute? » If you see something wrong or incorrectly interpreted then open an issue or send a pull request. We appreciate your contribution and all suggestions/PRs are welcome. You can also ping me on twitter@iamsarvagyaa.

:scroll: Things to be done! » I started this project from scratch. Steadily, I will update more resources and notes that I've found useful while learning Android Security. The upcoming lineup for this project ...

  • [ ] I will add more resources
  • [ ] Add conference papers, notes and more
  • [ ] Write more blogposts related to android security ...

<a name="synopsis"></a>

:spiral_notepad: Synopsis

<a name="getting-started"></a>

Getting Started

<a name="h1-reports"></a>

HackerOne Reports

  • Account hijacking possible through ADB backup feature :: #12617
  • Twitter android app Fragment Injection :: #43988
  • Bypass Setup by External Activity Invoke :: #55064
  • Webview Vulnerablity in OwnCloud apk :: #87835
  • No permission set on Activities [Android App] :: #145402
  • Flaw in login with twitter to steal Oauth tokens :: #44492
  • Authentication Failed Mobile version :: #55530
  • Multiple Stored XSS on Sanbox.veris.in through Veris Frontdesk Android App :: #121275
  • Coinbase Android Security Vulnerabilities :: #5786
  • Insecure Data Storage in Vine Android App :: #44727
  • Sending payments via QR code does not require confirmation :: #126784
  • Bypass pin(4 digit passcode on your android app) :: #50884
  • REG: Content provider information leakage :: #146179
  • Shopify android client all API request's response leakage, including access_token, cookie, response header, response body content :: #56002
  • HTML/XSS rendered in Android App of Crashlytics through fabric.io :: #41856
  • ByPassing the email Validation Email on Sign up process in mobile apps :: #57764
  • Insecure Local Data Storage : Application stores data using a binary sqlite database :: #57918
  • Vulnerable to JavaScript injection. (WXS) (Javascript injection)! :: #54631
  • Coinbase Android Application - Bitcoin Wallet Leaks OAuth Response Code :: #5314
  • Reflected XSS in Zomato Mobile - category parameter :: #230119
  • MEW Wallet PIN Bypass [Android] :: #1242212
  • Firebase Database Takeover in Zego Sense Android app :: #1065134
  • Bypass of biometrics security functionality is possible in Android application (com.shopify.mobile) :: #637194
  • Persistant Arbitrary code execution in mattermost android :: #1115864
  • porcupiney.hairs : Java/Android - Insecure Loading of a Dex File :: #1161956
  • Unsafe deserialization leads to token leakage in PayPal & PayPal for Business [Android] :: #453791
  • Cookie steal through content Uri :: #876192
  • Bypassing Passcode/Device credentials :: #747726
  • [Java] CWE-755: Query to detect Local Android DoS caused by NFE :: #1061211
  • Path traversal in ZIP extract routine on LINE Android :: #859469
  • Android: Explanation of Access to app protected components vulnerability :: #951691
  • Java: CWE-749 Unsafe resource loading in Android WebView leaking to injection attacks :: #1011956
  • Android WebViews in Twitter app are vulnerable to UXSS due to configuration and CVE-2020-6506 :: #906433
  • Denial of Service | twitter.com & mobile.twitter.com :: #903740
  • Insecure Storage and Overly Permissive API Keys in Android App :: #753868
  • [Grab Android/iOS] Insecure deeplink leads to sensitive information disclosure :: #401793
  • No session logout after changing password & alsoandroid sessions not shown in sessions list so they can be deleted :: #194329
  • CVE-2019-5765: 1-click HackerOne account takeover on all Android devices :: #563870
  • API Keys Hardcoded in Github repository :: #766346
  • Changing email address on Twitter for Android unsets "Protect your Tweets" :: #472013
  • Golden techniques to bypass host validations in Android apps :: #431002
  • Improper protection of FileContentProvider :: #331302
  • Extremly simple way to bypass Nextcloud-Client PIN/Fingerprint lock :: #331489
  • Disclosure of all uploads to Cloudinary via hardcoded api secret in Android app :: #351555
  • [Mail.Ru Android] Typo in permission name allows to write contacts without user knowledge :: #440749
  • SQL Injection found in NextCloud Android App Content Provider :: #291764
  • [Android] HTML Injection in BatterySaveArticleRenderer WebView :: #176065
  • SQLi allow query restriction bypass on exposed FileContentProvider :: #518669
  • [Zomato Android/iOS] Theft of user session :: #328486
  • Protected Tweets setting overridden by Android app :: #519059
  • Bypassing lock protection :: #490946
  • Improper validation allows user to unlock Zomato Gold multiple times at the same restaurant within one day :: #486629
  • Authorization bypass using login by phone option+horizontal escalation possible on Grab Android App :: #205000
  • [IRCCloud Android] XSS in ImageViewerActivity :: #283063
  • [IRCCloud Android] Theft of arbitrary files leading to token leakage :: #288955
  • Two-factor authentication bypass on Grab Android App :: #202425
  • Android - Access of some not exported content providers :: #272044
  • Improper markup sanitisation in Simplenote Android application :: #297547
  • [Android] XSS via start ContentActivity :: #189793
  • [iOS/Android] Address Bar Spoofing Vulnerability :: #175958
  • Access of Android protected components via embedded intent :: #200427
  • Possible to steal any protected files on Android :: #161710
  • [Quora Android] Possible to steal arbitrary files from mobile device :: #258460
  • Multiple critical vulnerabilities in Odnoklassniki Android application :: #97295
  • Android - Possible to intercept broadcasts about uploaded files :: #167481
  • Download attachments with traversal path into any sdcard directory (incomplete fix 106097) :: #284346
  • [IRCCloud Android] Opening arbitrary UR
View on GitHub
GitHub Stars225
CategoryDevelopment
Updated1mo ago
Forks58

Security Score

100/100

Audited on Feb 11, 2026

No findings