Hey , first of all awesome video. when i run frida-ps -U or frida-ps -Uia my nox emulator shows android logo then restarts quickly. please help
@heart_locket2Күн бұрын
/cfr better
@LynxGenisys3 күн бұрын
Haha! I keep teasing my kid about crap talking and spawn killing etc in games and not clicking links etc, and how one day some1 is going to turn around n hack his arse n get revenge.. Think im gona plant one of these INSIDE his pc n have a lil fun. The amusing part is I can see him and his screen from my pc, while he can't see me n mine.. 😂😂😂
@ryanbuckner4 күн бұрын
great video
@aniket__98434 күн бұрын
Hey corSecure can u make video on flutter based application to bypass SSL pining
@NaeemTest-e4s5 күн бұрын
this is great, Thanks
@AndresArgentino-x5f5 күн бұрын
thanks
@Rizzer696 күн бұрын
Subbed! Thanks for posting
@aniket__98437 күн бұрын
Hey CoreSecure, can you provide a practical demo of each OWASP vulnerability you talked about in this video?
@azefanas7 күн бұрын
Bro can you make an emulator like mumu or memu to not get caught by mobile games? So it's detected as a real phone?
@takaozx7 күн бұрын
Do you think Termux can do CTF and clear a mission from beetlebug?
@TensorTide7 күн бұрын
hello, great video, but I have some doubts, can we connect?
@CorSecure7 күн бұрын
You can access this challenge, as well as all of the other challenges from the Advent of Cyber event here: tryhackme.com/r/room/adventofcyber2024
@mandiyego52438 күн бұрын
its black screen and emulator not launch
@iPsalmy12 күн бұрын
This was really helpful. Thanks 🙏🏽
@matheussiqueiramendes925412 күн бұрын
I'll try it right now, hope it work. If yes, god bless you
@ThambiranChetty13 күн бұрын
Really struggled to get this going with other tuts, this is the first video I came across that was simple, worked brilliantly and got the job done, well done
@CorSecure13 күн бұрын
I'm glad it helped!
@Merty-u3w14 күн бұрын
how to see variables in runtime?
@BritanyKnueven14 күн бұрын
Please boss, will I be able to evade emulator detection with this?
@subash-ly1rd14 күн бұрын
can you make it for ld player please
@thuweinmassoud906214 күн бұрын
How to decompile webchromium apk, and how to use those files after decompile can you provide more info we learn from you
@wardellcastles14 күн бұрын
Hey buddy... Thanks for the video! I will update my methodology to OWASP 2024 Top 10!
@CorSecure15 күн бұрын
You can find the OWASP Mobile Top 10 list here: owasp.org/www-project-mobile-top-10/
@tiknikalsupport15 күн бұрын
❤
@gravelpitty15 күн бұрын
Thanks for yet another helpful video, I did not know you can set the proxy directly in Android Studio. This facilitates setting up the proxy a lot since you do not need to fiddle with the network settings in the device user interface. However in minute 4:05 you set up the proxy to 127.0.0.1:8080 and the proxy status is set to "Proxy is unreachable". I have the same problem when having Burp listening only on the loopback interface and there is no connection possible through the proxy... I think 127.0.0.1 in this case refers to the device itself and not the host on which you are running Burp, right? When setting up Burp to listen on another interface, changing the proxy IP address to an externally reachable IP address the proxy status changes to "Success".
@AGGSTORE13 күн бұрын
change it to 0.0.0.0 to support all ips available in your device. Or us your local ip (ipconfig check)
@DigitalTrendzy202315 күн бұрын
What vulnerabilities a sqlite file can have jn apk file ranging from info to critical vulnerabilities
@zaidanrizq15 күн бұрын
If i want to use the rooted emulator, should i get the rooted one or it's just already rooted from the beginning we install the emulator?
@gravelpitty16 күн бұрын
This video and your channel are pure gold. Thanks a lot man! It's easy to get lost and waste so much time on these topics. Keep up the great work
@CorSecure16 күн бұрын
Thanks! I'm glad it was helpful!
@yashmeetmamodia590017 күн бұрын
nice
@toryspelling773719 күн бұрын
Great video super easy to follow
@jphzazueta20 күн бұрын
Thank youuuu!!!!!
@zhenobiikuzo495720 күн бұрын
Have u consider making discord group
@azam_izm20 күн бұрын
thank you sir from Pakistan ❤
@bioman200720 күн бұрын
Amazing video!!!! Thank you so much!!!
@YoungMonkeyB21 күн бұрын
How did you open command prompt?
@_briannw21 күн бұрын
Finally a simple, straight-forward tutorial. You're massively underrated, thanks so much for the informative video!
@CorSecure20 күн бұрын
I'm glad it was helpful!
@noaharkadedelgado21 күн бұрын
can i decrypt an ipa file without a hacked iphone? i got a hacked ios 6 lying around but a modern ios app that i just want to run on my mac with playcover
@CorSecure20 күн бұрын
You need a jailbroken phone in order to extract the IPA file from the device, but once you have the IPA file, you can do everything else without needing a device at all.
@noaharkadedelgado20 күн бұрын
@ how do I decrypt an ipa without the device specifically?
@starwin115922 күн бұрын
you a my hero!
@lennard445423 күн бұрын
so I have this app which seems to be uncrackable. it detects when frida is attached and instantly closes - it doesn't crash it actually sais in toast message bubble that is has detected an injection. resigning the entire application and it again detects that its not official anymore. there is probably some java/kotlin/assemlby code to patch this but how would you find it? the strings cannot be traced, not obvious method names, probably some obfuscation. so it seems like frida is just for playing around but not usable for real applications.
@CorSecure22 күн бұрын
Every application is different, and the app you're working with may have some sophisticated tampering and anti-reversing protections in place. I can't promise you that Frida will work for every application, but it is for much more than just playing around. I use it with real application every day in my day job.
@lennard445422 күн бұрын
@CorSecure hey thanks for then explanation! I managed to inject code with the a custom lsposed module - I noticed the app close quicker than Frida patches. So at least in Theory the protection can be patched.
@aperture1123 күн бұрын
is this also on momentum? \
@zhenobiikuzo495724 күн бұрын
hii btw do you consider making a discord community?
@Jose1234598224 күн бұрын
best tutorial out there!
@lennard445424 күн бұрын
11:55 same android version... unfortunately my magisk instance keeps asking for additional setup :/ EDIT It worked using the "FAKEBOOTIMG" argument
@Sasvdo25 күн бұрын
How to bypass emulator detection
@Sasvdo25 күн бұрын
How to not get known as an Emulateur
@anulearntech26 күн бұрын
Solar power with solar cells is highly inefficient way of converting solar energy to electricity. I saw a video of a house using solar death ray concentrating light onto a water container boiling it creating a steam engine, which is used for cooking or powering whole house.
@QuenshaAbigail27 күн бұрын
why my PC run adb connect 10.0.2.2, return showing "failed to connect to 10.0.2.2:5555"?
@kostassymeonidis167628 күн бұрын
Well done! Very helpful
@Hari-88829 күн бұрын
amazing tutorial man, easily the best i've seen. Thank you so much
@kallebyvianadeoliveira7579Ай бұрын
i hope you continue to bring this excellent content, it has helped me a lot. thank you for sharing so much knowledge.