Trusted Logo (15)
HOMEServicesFoxradar 360GRCacademyOriginsAdvisoryBlogFOXXCON
Contact us

HOME /

BLOGS /

Android

Android

Dark background filled with vertical columns of random, light gray numeric digits resembling digital code.
November 17, 2025
Android

Android Tapjacking Vulnerability

Android tapjacking is a silent UI-based attack that tricks users into granting dangerous permissions without their knowledge. Learn how it works, how to test for it, and how to protect your apps with expert pentesting from Redfox Cybersecurity.

Karan Patel
,
CEO
Dark background filled with vertical columns of random, light gray numeric digits resembling digital code.
November 3, 2025
Android

Installing Burp Suite's CA as a System Certificate on Android

Learn how to install Burp Suite's CA certificate as a system-level certificate on Android devices for effective mobile penetration testing. Step-by-step commands included.

Karan Patel
,
CEO
Dark background filled with vertical columns of random, light gray numeric digits resembling digital code.
October 8, 2025
Android

Task Hijacking StrandHogg (Part 2)

Dive deep into StrandHogg Task Hijacking in Part 2 of our series. Learn advanced exploitation techniques, real ADB commands, detection methods, and how professional pentesting can protect your Android apps.

Karan Patel
,
CEO
Dark background filled with vertical columns of random, light gray numeric digits resembling digital code.
October 6, 2025
Android
iOS

Preventing Exploitation of Deep Links

Deep links are powerful but dangerous when left unsecured. Learn how attackers exploit deep link vulnerabilities, real-world attack vectors, and proven strategies to lock them down before they become your next breach.

Karan Patel
,
CEO
Dark background filled with vertical columns of random, light gray numeric digits resembling digital code.
September 15, 2025
Android

SSL Pinning Bypass for Android Using Frida

Learn how to bypass SSL pinning on Android apps using Frida with step-by-step commands, real-world techniques, and expert insights for penetration testers and security researchers.

Karan Patel
,
CEO
Dark background filled with vertical columns of random, light gray numeric digits resembling digital code.
July 7, 2025
Android

Task Hijacking StrandHogg (Part 1)

Discover how the StrandHogg task hijacking vulnerability works on Android, how attackers exploit it in real-world scenarios, and how your organization can stay protected. Part 1 of a deep-dive series by Redfox Cybersecurity.

Karan Patel
,
CEO
Dark background filled with vertical columns of random, light gray numeric digits resembling digital code.
June 27, 2025
Android

Android Root Detection Bypass Using Frida

Learn how to bypass Android root detection using Frida with step-by-step commands, hooks, and scripting techniques. A practical guide for mobile security professionals and pentesters.

Karan Patel
,
CEO
Dark background filled with vertical columns of random, light gray numeric digits resembling digital code.
June 25, 2025
Android

Dumping Android Application Memory

Learn how to dump Android application memory using ADB, Fridump, and other tools. A step-by-step guide for penetration testers to extract sensitive data from Android apps.

Karan Patel
,
CEO
Dark background filled with vertical columns of random, light gray numeric digits resembling digital code.
June 10, 2025
Android

Exploring Native Modules in Android with Frida

Learn how to explore and hook native modules in Android applications using Frida. A hands-on technical guide covering ARM disassembly, JNI bridge analysis, and dynamic instrumentation for mobile penetration testers.

Karan Patel
,
CEO
Dark background filled with vertical columns of random, light gray numeric digits resembling digital code.
March 10, 2025
Android

How to Exploit Android Activities

Learn how to exploit Android Activities using ADB, Drozer, and manual techniques. A practical guide for security researchers covering exported activities, intent hijacking, and more.

Karan Patel
,
CEO
Trusted Logo (15)

Redfox Cyber Security Inc.
8 The Green, Ste. A, Dover,
Delaware 19901,
United States.

info@redfoxsec.com

Quick Menu

HomeOriginsServicesBlogContact
SUBMIT
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Follow Us :

@ 2026 Redfox Cybersecurity Inc. All rights reserved.

Privacy PolicyTerms of Service