bug-bounty497
google348
xss301
microsoft290
facebook261
rce211
exploit198
malware168
apple161
cve135
account-takeover115
bragging-post102
privilege-escalation96
csrf90
phishing86
browser75
writeup74
authentication-bypass69
supply-chain67
dos66
stored-xss65
reflected-xss57
ssrf56
reverse-engineering54
access-control52
react52
input-validation49
cross-site-scripting48
cloudflare47
aws47
docker46
web-security46
lfi46
smart-contract45
sql-injection45
web-application44
ethereum44
ctf43
web343
defi43
oauth43
node41
race-condition39
pentest39
open-source39
idor37
cloud37
info-disclosure36
burp-suite36
auth-bypass35
0
7/10
vulnerability
A security researcher bypassed a custom token-based rate-limiting protection in an Android application by using FRIDA to dynamically hook and overload the native token generation method at runtime, allowing brute-force attacks to succeed by circumventing rate-limit detection through method signature manipulation.
token-authentication
brute-force
rate-limiting
android
native-code
frida
method-overloading
dynamic-instrumentation
apk-analysis
jadx
ida
reverse-engineering
binary-analysis
black-box-testing
FRIDA
JADX
IDA
Burpsuite
Genymotion
Android
ACME