Cyber Springboard Cyber Springboard Cyber Springboard
About Blog Courses Pathways Springboard Cards Register Log in
Cyber Springboard
About Blog Courses Pathways Springboard Cards
Register Log in
  1. Home
  2. Decks
  3. Cyber Springboard
All CyBOK:INT (2) CyBOK:RMG (14) CyBOK:HF (7) CyBOK:POR (8) CyBOK:LR (5) CyBOK:MAL (31) CyBOK:ADV (30) CyBOK:FOR (20) CyBOK:SOIM (12) CyBOK:CRY (1) CyBOK:OS (23) CyBOK:DSS (2) CyBOK:FMS (3) CyBOK:AAA (4) CyBOK:SS (13) CyBOK:WM (19) CyBOK:SSL (26) CyBOK:NS (37) CyBOK:HWS (2) CyBOK:ACRY (3) CyBOK:CPS (2) CyBOK:PL (1) AppSec (12) Knowledge (47) Tools (59) Mailing List (3) Dynamic analysis (21) Injection (2) Modification (2) Protocols (4) Exercise (129) Android (4) Linux (10) Windows (5) Training (11) General (36) Command line (7) Programming (27) Reversing (3) Software (2) Terminology (3) Static analysis (17) Threat Modelling (2) Vulnerabilities (4) Standards (2) Data protection (1) OSINT (4) Game (4) Video (4) Easy (43) Medium (4) Hard (1)

Create an Android app using a native library and JNI calls

Android Exercise
Cyber Springboard | Card

Root an Android device

Android Exercise
Cyber Springboard | Card

Unpack an APK using APKTools

Android Exercise
Cyber Springboard | Card

Watch Maddie Stone's talk, Bad Binder: Finding an Android In The Wild 0day

  • Bad Binder talk Bad Binder talk

Maddie Stone is a security researcher on Google Project Zero.

CyBOK:OS CyBOK:SS CyBOK:WM Android AppSec Video
Cyber Springboard | Card
© 2022 Cyber Springboard

hello@cyberspringboard.com

Cyber Springboard

  • Attribution
  • Cookies
  • Privacy policy

Community

  • CISSE
  • CyBOK
  • Mattermost

CyBOK Tools

  • Our CyBOK Profile
  • Topics browser

Subscribe

Daily suggestions to build your cyber skills.

We respect your privacy and will only use your email for sending cards of the day and occasional other important updates about Cyber Springboard. We do not share your personal details with third parties.