1.
Introduction
2.
Authors
3.
Tools
4.
Installation
4.1.
Bypass
4.1.1.
GPU detection
4.1.2.
Root Detection
4.1.3.
Frida detection with Ghidra
5.
Footprinting
5.1.
Decrypting response
5.2.
Recreating crypto functions
6.
Exploits
6.1.
REST API vulnerabilities
6.2.
Sensitive Information Disclosure
6.3.
Exported activities
6.4.
Webview via deeplink
7.
Contribute
8.
Additional Resources
Light
Rust
Coal
Navy (default)
Ayu
Damn Vulnerable Bank
Additional Resources
TBD