A collection of android Exploits and guide on android exploitation
- Insecure Data Storage
- Weak Server Side Controls
- Insufficient Transport Layer Protection
- Client Side Injection
- Poor Authorization and Authentication
- Improper Session Handling
- Security Decisions Via Untrusted Inputs
- Side Channel Data Leakage
- Broken Cryptography
- Sensitive Information Disclosure
- SSH
- VNC server
- A compiler (gcc / agcc)
- Android SDK (adb!)
- XCode
- Jailbroken iDevice
- Rooted Android Device
- A survey of Android exploits in the wild - The Android operating system Exploitation Survey
- Popular Android Exploits - Introduction to Android Exploits.
- Own your Android! Yet Another Universal Root - Android root exploitation
- ASDC12-Smart_Bombs_Mobile_Vulnerability_and_Exploitation - Mobile Vulnerability Exploitation
- BlueBorne - Android Exploit - Exploiting an RCE Over the Air
- EVOLUTION OF ANDROID EXPLOITS - Evolution of Android exploits from a statistical analysis tool perspective
- Hacking Androids for Fun and for Profit - Android Exploitation