1. 1. Introduction
  2. 2. Authors
  3. 3. Tools
  4. 4. Installation
    1. 4.1. Bypass
      1. 4.1.1. GPU detection
      2. 4.1.2. Root Detection
      3. 4.1.3. Frida detection with Ghidra
  5. 5. Footprinting
    1. 5.1. Decrypting response
    2. 5.2. Recreating crypto functions
  6. 6. Exploits
    1. 6.1. REST API vulnerabilities
    2. 6.2. Sensitive Information Disclosure
    3. 6.3. Exported activities
    4. 6.4. Webview via deeplink
  7. 7. Contribute
  8. 8. Additional Resources

Damn Vulnerable Bank

Additional Resources

TBD