CVE-2026-0047: Stealing Screenshots from Every Running App
Missing Android permission check lets any app dump UI bitmaps from running apps.
https://www.mobilehackinglab.com/blog/cve-2026-0047-activitymanager-eop-steal-images

| Web | https://kriware.com/ |
CVE-2026-0047: Stealing Screenshots from Every Running App
Missing Android permission check lets any app dump UI bitmaps from running apps.
https://www.mobilehackinglab.com/blog/cve-2026-0047-activitymanager-eop-steal-images
Android APV 0-Click Overflow
Patch analysis shows malformed video files can trigger a heap overflow in Android’s APV codec, enabling zero-click RCE.
https://www.mobilehackinglab.com/blog/exploiting-android-apv-codec-0click-heap-overflow
Codex Hacked a Samsung TV
Researchers gave an AI a browser foothold on a TV, and it found a kernel path to root by abusing exposed memory-mapping drivers
Homelable
A self-hosted homelab mapper that scans local networks, draws interactive topology diagrams, and shows live node status.
ELF & Dynamic Linking
Explains how Linux turns an ELF binary into a running process, covering execve, fork, file descriptors, syscalls, loaders, and memory mapping.
https://fmdlc.github.io/tty0/Linux_ELF_Dynamic_linking_EN.html
Compiling Android Kernel for my OnePlus Device
A researcher explains how to build, flash, and debug a custom Android kernel for mobile kernel research.
FLARE Learning Hub
Free hub with reverse engineering, malware analysis, labs, and debugging modules for hands-on Windows x64 training.
Claude Code in Action Course
Teaches how to use Claude for coding tasks, covering workflows, prompt design, and practical development use cases.
MCP Course on Model Context Protocol
Introduces concepts and hands-on labs to understand MCP, enabling structured interaction between models and external tools.
Firmware Teardown Confirms Hidden Features
Researchers reverse firmware, uncover hidden debug features and attack surface exposing risks in embedded devices.
https://blog.quarkslab.com/nerd-life-weeks-firmware-teardown-we-were-right.html
In a blog post published last December, we demonstrated how we managed to extract the firmware from a smartwatch by exploiting an out-of-bounds read vulnerability and spying on its screen interface. Follow us on our long and unexpected journey to figure out how this smartwatch can measure heart rate or blood pressure with no visible sensor, the problems we encountered while analyzing its firmware, and how we solved them to uncover The Truth about this device.