Tweets from June 2015

RT @jduck: Android development in Eclipse loses official support EOY. Users continuing with Eclipse should look at "Andmore" http://t.co/tncfSd9iMk

2:03pm June 30th 2015 via FalconPro3

RT @Gunther_AR: Links to those Android articles in @droidsec had been updated again. http://t.co/q16CTK2kJo

8:28pm June 29th 2015 via FalconPro3

Official Xposed for lollipop (5.0) now allows hooking native methods, also arm64 and x86 builds available! - http://t.co/EGrSnZYbB1

3:29pm June 29th 2015 via Twitter Web Client

RT @jduck: Just posted AOSP change log from 5.1.1_r4 to 5.1.1_r5 to http://t.co/FuJORcWdgU More security fixes, but unfortunately for Nexus 6 only. WTF

10:05pm June 28th 2015 via FalconPro3 BETA

RT @timstrazz: Advanced Android Application Security Case Studies talk from Flanker (Keen Team) @ GeekPwn https://t.co/J5RVAYKiuo

8:37pm June 28th 2015 via FalconPro3 BETA

RT @timstrazz: An awesome walkthrough (in Chinese) for reversing the Android Tencent packer http://t.co/oePSXCCgWu

8:35pm June 28th 2015 via FalconPro3 BETA

RT @timstrazz: If you’re lazy the dex extraction happens in libdvm, which is “fixed” here - https://t.co/mljlYPQGEh - requires replacing system lib

8:35pm June 28th 2015 via FalconPro3 BETA

RT @timstrazz: Excellent, BlueBunny released a DexExtractor (generically dump dex files) for packers/protectors https://t.co/1A85iTVpCj

8:35pm June 28th 2015 via FalconPro3 BETA

RT @wooyunsec: #infosec #Drops Advanced Android Application Analysis Series – JEB API @flanker_hqd http://t.co/Y1YqMeW7yv

8:31pm June 28th 2015 via FalconPro3 BETA

RT @reyammer: [Release] PATDroid: a new Program Analysis Toolkit for Android! https://t.co/tOdXTXc0p7 (thanks to the S&P'15 AppAudit's guys for sharing!)

8:27pm June 25th 2015 via FalconPro3 BETA

RT @kapitanpetko: Could it be true that Android 5.1.1_r5 enables both dm-verity *and* HW accelerated FDE? Great success if so. http://t.co/thXujxfF0j

8:25pm June 25th 2015 via FalconPro3 BETA

RT @AndroidPolice: AOSP Developer Changelog Posted For v5.1.1_r4 (LMY48B) To v5.1.1_r5 (LYZ28E), And It's Actually Quite Long http://t.co/mcT2QojM55

8:25pm June 25th 2015 via FalconPro3 BETA

RT @BlackHatEvents: Android’s Stagefright critically exposes 95% of devices. See the proof-of-concept demo by @jduck, #BHUSA Briefing http://t.co/PGpV4FOcor

8:21pm June 25th 2015 via FalconPro3 BETA

RT @NowSecureMobile: Want more information about the #Samsung vuln we disclosed last week? Join the webinar to learn more https://t.co/VLwP4KcPdm #androiddev

8:21pm June 25th 2015 via FalconPro3 BETA

RT @0xroot: QuarksLabs ChatSecure review - http://t.co/8vNVAPI8pm Interesting read

12:33pm June 25th 2015 via FalconPro3 BETA

RT @f47h3r_B0: Rooted wink hub via NAND flash glitch to bootloader. Thanks @exploiteers! https://t.co/5UjXp83sen http://t.co/O66lJzmEsQ @iotvillage

12:33pm June 25th 2015 via FalconPro3 BETA

RT @Silensec: Nyuki Android Lock Cracker is capable of cracking & generating #android lock hashes https://t.co/RH2lhs8z0a #infosec http://t.co/yVSfTczfzn

6:08am June 25th 2015 via FalconPro3 BETA

RT @Fuzion24: More Samsung/OEM specific garbage causing major issues. (via @marcograss) https://t.co/dUYKqmvNK6 https://t.co/XQLNtJccPs

6:08am June 25th 2015 via FalconPro3 BETA

RT @Dinosn: (Mobile Pwn2Own) Samsung Galaxy S5 MethodSpec Deserialization of Untrusted Data Remote Code Execution Vulnerability http://t.co/p8Y9OE1aWa

6:07am June 25th 2015 via FalconPro3 BETA

RT @insitusec: SE Android analysis tool for live device https://t.co/28VGjed8Ho

6:07am June 25th 2015 via FalconPro3 BETA

RT @Mobile_Sec: Good wrap up: The Future of Mobile Forensics http://t.co/7th3najm63 Physical, Logical, JTAG, Chip-off, OTA, Backup …

6:02am June 25th 2015 via FalconPro3 BETA

RT @collinrm: Mobile Security News Update June 2015 (2) https://t.co/9TpL7o3ApY Esser vs Pangu (read it!) & move to HTTPS only

5:53am June 25th 2015 via FalconPro3 BETA

AndroidEagleEye: An Xposed module which is capable of hooking both Android system APIs and applications' methods - https://t.co/cOc1VS1fZR

4:51am June 25th 2015 via FalconPro3 BETA

RT @revskills: On detecting and preventing the Samsung IME Keyboard / SwiftKey language pack update vulnerability, via @insitusec https://t.co/eEFH6TiPmj

3:32pm June 24th 2015 via FalconPro3 BETA

RT @byuu_san: ZSNES v1.51 exploit: it's possible to execute native x86 code embedded inside SNES ROM images. https://t.co/tkXX9j8ln2

7:16am June 24th 2015 via FalconPro3 BETA

RT @FightCade: USG Article by @john_learned: How FightCade saved an online classic gaming community from the brink of doom - http://t.co/vZ1IEr9wb9

11:36pm June 23rd 2015 via FalconPro3 BETA

RT @Gunther_AR: Android应用分析进阶教程之一- 初识JEBAPI by Flanker from @K33nTeam - http://t.co/TuBk482uum https://t.co/yiEJLolnNp

11:43am June 23rd 2015 via FalconPro3 BETA

RT @virtualabs: My #ndh2k15 slides: http://t.co/Ua33p4s4lf sha256sum 58814800c6c5ecfc79b7b269c744396218508a5ec438253102333c78a7f65186 #Android #hacking

11:32am June 23rd 2015 via FalconPro3 BETA

byeselinux: Android kernel module to bypass SELinux at boot. Made for XZDualRecovery (Xperia) & Lollipop firmwares - https://t.co/tppUo3Cxx4

4:53pm June 22nd 2015 via Twitter Web Client

RT @Fuzion24: My slide deck I presented at Blackhat London: https://t.co/38lOGHP0Kf -- Remote exploitation of some Android apps and Samsung devices

8:16pm June 21st 2015 via FalconPro3 BETA

RT @maldr0id: Malware obfuscation: building new #Android code on the spot https://t.co/Gps3O3m8Bb - a way to fool static signatures?

11:43am June 21st 2015 via FalconPro3 BETA

RT @cryptax: My slidess on #Android #malware #profiling: http://t.co/1y4VpTS1oe sha1sum: 947f92099c16297762d8366f72608c6c11fa5f82

11:42am June 21st 2015 via FalconPro3 BETA

RT @Technologeeks: #Dextra - for #Android #OAT #ART #reversing - v1.5 for #M (ART15/OAT62), with binaries for Linux, OS X and Android: http://t.co/6tn4Ejtam8

9:11pm June 19th 2015 via FalconPro3 BETA

RT @cpu: Run your own mailserver? Does it use strong TLS settings to GMail? Mine didn't, here's a story about how I fixed it: http://t.co/lSAPNsehI2

8:05pm June 18th 2015 via FalconPro3 BETA

RT @fridadotre: Frida 4.2 is out! Dalvik and ObjC object carving, FFI support for structs, ObjC improvements and lots of bug-fixes. http://t.co/O1Cr1XCe4z

6:58pm June 18th 2015 via Twitter Web Client

dexstrings: Extracting strings from dex files with meaning - https://t.co/ZqzqmaUolT by @hugo_glez (code looks suspiciously familiar to me)

11:08am June 18th 2015 via Twitter Web Client

RT @ikoz: Android M and the war on cleartext traffic: https://t.co/ML4HU5Uta8 - the new "usesCleartextTraffic" manifest flag

9:21am June 18th 2015 via FalconPro3 BETA

RT @tklengyel: @ABazhaniuk ARMv8 TrustZone reference implementation: https://t.co/enPz8OPrCi

9:21am June 18th 2015 via FalconPro3 BETA

RT @jebdec: JEB2 Decompiler demo beta is available for download at https://t.co/F9rtKSxjVF

8:52am June 18th 2015 via FalconPro3 BETA

RT @AndroidPolice: [Android M Feature Spotlight] Fastboot Fixes Notorious "missing system.img" Bug, Adds 'Flashing' Commands And… http://t.co/fe6bbYzpKP

8:45am June 18th 2015 via FalconPro3 BETA

RT @mitmproxy: Official @docker images for mitmproxy are here. To get the current dev master, say: docker pull mitmproxy/mitmproxy (thanks to @insitusec)

7:22am June 17th 2015 via FalconPro3 BETA

RT @insitusec: handy JEB plugin to rename classes based on multiple strategies--adds source attribute in case avail https://t.co/RcYuNXv7jR #re #android

7:32pm June 16th 2015 via FalconPro3 BETA

RT @Fuzion24: No user interaction, silent remote code exploit as system user for most Samsung devices: https://t.co/t4QjQXk3Nv -> https://t.co/7DjOLpDtGn

6:17pm June 16th 2015 via FalconPro3 BETA

RT @jduck: Regardless I want to thank @shydemeanor and his team for making this huge leap. Cheers to improving Android security through open research!

6:14pm June 16th 2015 via FalconPro3 BETA

Samsung Swift keyboard RCE exploit POC by @Fuzion24 - https://t.co/da26pvKyPg

2:35pm June 16th 2015 via Twitter Web Client

Remote Code Execution as System User on Samsung Phones via the pre-installed keyboard - https://t.co/lBRCJRu61T

11:51am June 16th 2015 via FalconPro3 BETA

A Pattern for Remote Code Execution on Android using Arbitrary File Writes and MultiDex Applications - https://t.co/70J7siTNDc

11:50am June 16th 2015 via FalconPro3 BETA

RT @ikoz: Android M also denies HTTP connections to all apps not explicitly requesting an exception! Pity Apple announced it first.

11:46am June 16th 2015 via FalconPro3 BETA

RT @ragingplatypi: Android remote exploit via zip directory traversal. Awesome vuln! @Fuzion24 @NowSecureMobile http://t.co/K0mSHHw43i

11:38am June 16th 2015 via FalconPro3 BETA

Android Security Rewards Program - https://t.co/ZEq8BP805t

11:37am June 16th 2015 via FalconPro3 BETA

RT @ochsff: Finally a top dollar bug bounty for Android! https://t.co/jh3KUUpgev

11:37am June 16th 2015 via FalconPro3 BETA

RT @AndroidPolice: [Android M Feature Spotlight] ADB Can Now Reboot Directly To Sideload Mode, Adds A Few Other Commands http://t.co/1aacRqG0YD

7:55am June 16th 2015 via FalconPro3 BETA

RT @AndroidTamer: Reversing DexGuard’s String Encryption : http://t.co/p5OhQwrQb0 by @ajinabraham @sach1nraj

7:17pm June 14th 2015 via FalconPro3 BETA

@rallat @edr vinga, fet! avisa'ns quan arribes :)

7:14pm June 13th 2015 via Twitter for Android in reply to rallat

@DavidJaumandreu si la tenim prop de la catedral, estas convidat a jugar quan vulguis :) http://t.co/AVRtp1lZpi

4:27pm June 13th 2015 via FalconPro3 BETA in reply to DavidJaumandreu

@DavidJaumandreu apuntat aquí: http://t.co/CLHTOg2v4Y normalment juguem online al @FightCade i de tant en tant fem torneig Offline (2/2)

3:45pm June 13th 2015 via FalconPro3 BETA in reply to DavidJaumandreu

@DavidJaumandreu Si et mola ST, tenim un parell de B boards de Super Turbo, una amb una Astro City i l'altra amb supergun, a Barcelona (1/2)

3:43pm June 13th 2015 via FalconPro3 BETA in reply to DavidJaumandreu

Today is Jun 13th, Street Fighter 2 Day #sf2day Play it online at http://t.co/aMDlT9P0Ju http://t.co/Agw9IHjehl

10:47am June 13th 2015 via FalconPro3 BETA

RT @scottyab: Ever wanted a quick/easy way to generate SSL pins for a given URL? then check out a util i wrote https://t.co/nwffSCDDjG #androiddev #okhttp

2:58pm June 12th 2015 via Twitter Web Client

RT @scottyab: Article about my newly open sourced Safety Net API Helper for #AndroidDev http://t.co/7L8Q9M9UfW via @Intohand http://t.co/ANMulLj7rz

2:58pm June 12th 2015 via Twitter Web Client

RT @kapitanpetko: Decrypting Android M adopted storage http://t.co/kI16r82xBt

2:51pm June 12th 2015 via Twitter Web Client

Facebook Infer: a static program analyzer that Facebook uses to identify bugs before mobile code is shipped - https://t.co/0d15dWc36d

6:13pm June 11th 2015 via Twitter Web Client

RT @Ingumito: Bokken 1.8 out of the oven! r2 and Python consoles, new tabs, nuked pyew. http://t.co/UwcgRGWeTm And last PyGTK release, next stop GTK+3!

10:25am June 10th 2015 via Twitter Web Client

How to Root 10 Million Phones with One Exploit - http://t.co/nHEysc6lzL

10:23am June 10th 2015 via Twitter Web Client

Digging for Android Kernel Bugs - http://t.co/F2A7fKzvrs

10:23am June 10th 2015 via Twitter Web Client

RT @ahoog42: Understanding Android's Application Update Cycles - interesting analysis from @udayankumar https://t.co/rQD5pq39UV

10:22am June 10th 2015 via Twitter Web Client

RT @xdadevelopers: MXTP Provides Bootloader-Level Security Against Thieves http://t.co/q2SGg8NSv9 http://t.co/l7igVXsZnx

9:58pm June 9th 2015 via FalconPro3 BETA

RT @fridadotre: Frida 4.1 is out! Early instrumentation of iOS apps, Obj-C class creation in pure JS, Android goodies ++. Please RT! http://t.co/YwZAlJ4CEh

1:27pm June 9th 2015 via FalconPro3 BETA

RT @collinrm: Mobile Security News Update June 2015 https://t.co/l3DYWEA1pG

1:23pm June 9th 2015 via FalconPro3 BETA

enjarify: new tool for translating Dalvik bytecode to equivalent Java bytecode (similar to dex2jar) - https://t.co/BTGl1vjezQ

1:22pm June 9th 2015 via FalconPro3 BETA

RT @jduck: I tested with Android M Preview on Nexus 9 tonight. "INTERNET" permission is still prompted at install time as far as I can tell.

1:15pm June 9th 2015 via FalconPro3 BETA

RT @AndroidPolice: Android M Will Never Ask Users For Permission To Use The Internet, And That's Probably Okay http://t.co/YEnVdnhzkL

5:26pm June 6th 2015 via FalconPro3 BETA

RT @jduck: Some guys ported @grsecurity to work on the Nexus 7 2013! https://t.co/2rRNhgYqPd

11:27am June 6th 2015 via FalconPro3 BETA

RT @kapitanpetko: Software keystore blob parser/decryptor: https://t.co/zeHfubNKLN

12:09pm June 5th 2015 via FalconPro3 BETA

@ahoog42 @thomas_cannon lol Andrew, looks like you are 3 months behind the top of your timeline :)

11:53am June 5th 2015 via Twitter for Android in reply to ahoog42

RT @jduck: After a bit of a delay, I just put up AOSP changes from 5.1.1_r4 to m-preview. There are many security fixes in here! http://t.co/KlQLPKis6Z

7:25am June 5th 2015 via FalconPro3 BETA

RT @timstrazz: Interesting to hear about #Android OTA’s from an chipset person who went from zero know to shipping https://t.co/BXTeOtSDOV

7:24am June 5th 2015 via FalconPro3 BETA

RT @timstrazz: ELC 2015 talks, most with slides all with videos http://t.co/YFU0edQVKH - lots of interesting things + #Android stuff

7:24am June 5th 2015 via FalconPro3 BETA

RT @timstrazz: Added my 010Editor script for extracting multiple dex files from anything - works for (system) oat files https://t.co/LuhnkWDFpF

7:19am June 5th 2015 via FalconPro3 BETA

RT @AndroidTamer: Android for Work security Whitepaper : overview of various security features - at OS level & Google services layer : https://t.co/ZW5iOKow

7:17am June 5th 2015 via FalconPro3 BETA

RT @pelotasplus: How to recognise your app is being uninstalled https://t.co/4nNGWU8UYY slides from our #droidconDE barcamp presentation #AndroidDev

7:14am June 5th 2015 via FalconPro3 BETA

Google Android Bluetooth Forced Pairing Vulnerability https://t.co/QS4bFoqoID

7:06am June 5th 2015 via FalconPro3 BETA

RT @virqdroid: Google I/O 2015 - Android M Permissions - https://t.co/zC6tXL1ulK (#AndroidM #GoogleIO2015)

7:00am June 5th 2015 via FalconPro3 BETA

RT @AndroidPolice: [Android M Feature Spotlight] New Android Recovery Lets You Apply Updates From SD Card, View Recovery Logs, And… http://t.co/qPuLpOa9lo

6:08am June 5th 2015 via FalconPro3 BETA

RT @devunwired: I did some quick investigations into the new #Android ‘M’ permissions with legacy applications. https://t.co/m1hV06mjRq

6:05am June 5th 2015 via FalconPro3 BETA

RT @jake_valletta: I wrote an Xposed module based off @MDSecLabs's research for hooking SQLCipher passwords on #Android http://t.co/twuA0ZuEE2

6:03am June 5th 2015 via FalconPro3 BETA

RT @kapitanpetko: Project Vault (secure device in mSD card format) source code https://t.co/EbYVbPq0bw

5:47am June 5th 2015 via FalconPro3 BETA

RT @AndroidPolice: [Android M Feature Spotlight] Bluetooth Scanning Joins WiFi To Improve Location Accuracy http://t.co/N5zbYl4hzn

5:41am June 5th 2015 via FalconPro3 BETA

@therealundamned I sent you an email last week regarding UD-CPS2, did you get it?

10:16pm June 2nd 2015 via FalconPro3 BETA