Cyber Springboard Cyber Springboard Cyber Springboard
About Blog Courses Pathways Springboard Cards Register Log in
Cyber Springboard
About Blog Courses Pathways Springboard Cards
Register Log in
  1. Home
  2. Decks
  3. Cyber Springboard
All CyBOK:INT (2) CyBOK:RMG (14) CyBOK:HF (7) CyBOK:POR (8) CyBOK:LR (5) CyBOK:MAL (31) CyBOK:ADV (30) CyBOK:FOR (20) CyBOK:SOIM (12) CyBOK:CRY (1) CyBOK:OS (23) CyBOK:DSS (2) CyBOK:FMS (3) CyBOK:AAA (4) CyBOK:SS (13) CyBOK:WM (19) CyBOK:SSL (26) CyBOK:NS (37) CyBOK:HWS (2) CyBOK:ACRY (3) CyBOK:CPS (2) CyBOK:PL (1) AppSec (12) Knowledge (47) Tools (59) Mailing List (3) Dynamic analysis (21) Injection (2) Modification (2) Protocols (4) Exercise (129) Android (4) Linux (10) Windows (5) Training (11) General (36) Command line (7) Programming (27) Reversing (3) Software (2) Terminology (3) Static analysis (17) Threat Modelling (2) Vulnerabilities (4) Standards (2) Data protection (1) OSINT (4) Game (4) Video (4) Easy (43) Medium (4) Hard (1)

Create an Android app using a native library and JNI calls

Android Exercise
Cyber Springboard | Card

Root an Android device

Android Exercise
Cyber Springboard | Card

Unpack an APK using APKTools

Android Exercise
Cyber Springboard | Card

Watch Maddie Stone's talk, Bad Binder: Finding an Android In The Wild 0day

  • Bad Binder talk Bad Binder talk

Maddie Stone is a security researcher on Google Project Zero.

CyBOK:OS CyBOK:SS CyBOK:WM Android AppSec Video
Cyber Springboard | Card
© 2022 Cyber Springboard

hello@cyberspringboard.com

Cyber Springboard

  • Attribution
  • Cookies
  • Privacy policy

Community

  • CISSE
  • CyBOK
  • Mattermost

CyBOK Tools

  • Our CyBOK Profile
  • Topics browser
  • Job role explorer