Skip to content
AWAKE
BioCatch
Initializing search
zahidaz/awake
Home
Attack Techniques
Malware
Packers
Reversing
Platform Abuse
Grayware
Industry
Resources
AWAKE
zahidaz/awake
Home
Attack Techniques
Attack Techniques
Activities
Activities
Overlay Attacks
Tapjacking
Task Affinity Attacks
Services
Services
Accessibility Abuse
Notification Listener Abuse
Broadcast Receivers
Broadcast Receivers
Broadcast Theft
SMS Interception
Content Providers
Content Providers
Content Provider Attacks
Intents
Intents
Deep Link Exploitation
Intent Hijacking
WebViews
WebViews
WebView Exploitation
Cross-Cutting
Cross-Cutting
AI-Assisted Malware
Anti-Analysis Techniques
App Collusion
App Virtualization Attacks
Automated Transfer Systems
C2 Communication
Call Interception
Camera & Microphone Surveillance
Carrier Billing Fraud
Clipboard Hijacking
Data Exfiltration
Device Admin Abuse
Device Wipe & Ransomware
Dynamic Code Loading
Fake Biometric Prompts
Keylogging
Launcher Hijacking
Location Tracking & Geofencing
Mass Malware Generation
Network Traffic Interception
NFC Relay
Notification Suppression
Persistence Techniques
Phishing Techniques
Play Store Evasion
Privilege Escalation
Runtime Permission Manipulation
Screen Capture
SIM & Carrier-Level Attacks
Supply Chain Attacks
Work Profile Abuse
Malware
Malware
Timeline
Distribution Channels
Naming Conventions
Threat Actors
Families
Families
AirPush
Albiriox
Alien
Anatsa
Antidot
Anubis
AridSpy
Arsink
Autoins
BankBot
BingoMod
BlankBot
BoneSpy
BRATA
Brokewell
BTMOB RAT
Canis C2
Cerberus
Chameleon
Chrysaor
Cifrat
Copybara
Crocodilus
DCHSpy
DeVixor
DoubleLocker
DroidDream
DroidKungFu
EagleMsgSpy
Elibomi
Ermac
Etinu
Exobot
Fakecalls
FakePlayer
FinSpy
FireScam
FluBot
FluHorse
Frogblight
FvncBot
Geinimi
Gigabud
GM Bot
GodFather
GoldDigger
GoldPickaxe
Goldoson
GriftHorse
GuardZoo
Gustuff
Harly
Hermit
Herodotus
Hook
HummingBad
Hydra
Joker
Keenadu
Klopatra
Koler
KoSpy
LightSpy
LokiBot
Mamont
Mandrake
Marcher
Medusa
Mirax
MobiDash
MoqHao
Necro
NoVoice
NGate
NotCompatible
Obad
Octo
Pegasus
PhoneSpy
PixPirate
PixStealer
PJobRAT
Plankton
PlainGnome
Predator
ProSpy
PromptSpy
Rafel RAT
RatOn
Red Alert 2.0
SharkBot
Shedun
Simplocker
SlemBunk
SLocker
SoumniBot
SparkCat
SpinOk
SuperCard X
SpyAgent
SpyLoan
SpyNote
Sturnus
Svpeng
Thamera
ToxicPanda
Triada
TrickMo
TsarBot
Vultur
WAMod
Xenomorph
Zanubis
Ztorg
Packers
Packers
Allatori
Appdome
AppSealing
Arxan (Digital.ai)
APKProtect
Baidu Reinforcement
Bangcle (SecNeo)
DPT Shell
Ducex
DexGuard
DexProtector
GoldCrypt
Hqwar
iJiami
Kiwisec (å‡ ç»´å®‰å…¨)
LIAPP
NeteaseYiDun
Promon SHIELD
Qihoo 360 Jiagu
R8 / ProGuard
Redex (Meta)
SecShell (Bangcle)
Tencent Legu
Verimatrix XTD
Virbox
zShield (Zimperium)
Reversing
Reversing
Static Analysis
Dynamic Analysis
Hooking
ART Hooking Libraries
Patching
Network Analysis
Development Frameworks
Development Frameworks
AppInventor / Kodular
B4A
Cocos2d-x
Compose Multiplatform
Cordova / Ionic / Capacitor
Corona / Solar2D
Defold
Delphi / RAD Studio
Felgo
Flutter
GameMaker
GDevelop
Godot
Kivy (Python)
Kotlin Multiplatform
libGDX
NativeScript
PWA / TWA
Qt for Android
React Native
Ren'Py
RPG Maker
Sketchware
Titanium
uni-app
Unity
Unreal Engine
Xamarin / .NET MAUI
Platform Abuse
Platform Abuse
App Sandbox
SELinux
Verified Boot
Keystore
Play Integrity
Play Frosting
Biometric Authentication
Permissions
Permissions
Calendar
Calendar
READ_CALENDAR
WRITE_CALENDAR
Call Log
Call Log
PROCESS_OUTGOING_CALLS
READ_CALL_LOG
WRITE_CALL_LOG
Camera
Camera
CAMERA
Contacts
Contacts
GET_ACCOUNTS
READ_CONTACTS
WRITE_CONTACTS
Location
Location
ACCESS_BACKGROUND_LOCATION
ACCESS_COARSE_LOCATION
ACCESS_FINE_LOCATION
Microphone
Microphone
RECORD_AUDIO
Phone
Phone
ACCEPT_HANDOVER
ADD_VOICEMAIL
ANSWER_PHONE_CALLS
CALL_PHONE
READ_PHONE_NUMBERS
READ_PHONE_STATE
USE_SIP
Sensors
Sensors
BODY_SENSORS
BODY_SENSORS_BACKGROUND
Activity Recognition
Activity Recognition
ACTIVITY_RECOGNITION
SMS
SMS
READ_SMS
RECEIVE_MMS
RECEIVE_SMS
RECEIVE_WAP_PUSH
SEND_SMS
Storage
Storage
READ_EXTERNAL_STORAGE
READ_MEDIA_AUDIO
READ_MEDIA_IMAGES
READ_MEDIA_VIDEO
WRITE_EXTERNAL_STORAGE
Nearby Devices
Nearby Devices
BLUETOOTH_ADVERTISE
BLUETOOTH_CONNECT
BLUETOOTH_SCAN
NEARBY_WIFI_DEVICES
UWB_RANGING
Special Permissions
Special Permissions
BIND_ACCESSIBILITY_SERVICE
BIND_CALL_REDIRECTION_SERVICE
BIND_TELECOM_CONNECTION_SERVICE
BIND_DEVICE_ADMIN
BIND_NOTIFICATION_LISTENER_SERVICE
BIND_VPN_SERVICE
INTERACT_ACROSS_USERS_FULL
MANAGE_EXTERNAL_STORAGE
PACKAGE_USAGE_STATS
REQUEST_DELETE_PACKAGES
REQUEST_INSTALL_PACKAGES
SYSTEM_ALERT_WINDOW
USE_FULL_SCREEN_INTENT
WRITE_SETTINGS
Normal (Abusable)
Normal (Abusable)
ACCESS_NETWORK_STATE
ACCESS_WIFI_STATE
CHANGE_WIFI_STATE
DISABLE_KEYGUARD
FOREGROUND_SERVICE
GET_TASKS
FOREGROUND_SERVICE_DATA_SYNC
FOREGROUND_SERVICE_MEDIA_PROJECTION
INTERNET
MODIFY_AUDIO_SETTINGS
NFC
POST_NOTIFICATIONS
QUERY_ALL_PACKAGES
RECEIVE_BOOT_COMPLETED
RECEIVE_USER_PRESENT
REQUEST_IGNORE_BATTERY_OPTIMIZATIONS
SCHEDULE_EXACT_ALARM
WAKE_LOCK
Grayware
Grayware
Ad Fraud
Analysis Approach
Children's App Data Harvesting
Commercial Surveillance Vendors
Data Broker SDKs
Device Fingerprinting
Firmware Grayware
Predatory Lending Apps
Riskware / Dual-Use Apps
Stalkerware
Surveillance & Data Trade
Industry
Industry
8kSec
abuse.ch
Access Now
ADF Solutions
AhnLab
Amnesty Security Lab
Antiy
Any.Run
Appdome
AppCensus
appknox
Approov
AT&T Alien Labs
Avast
Baidu
Belkasoft
BioCatch
Bitdefender
Bitsight
Bugcrowd
Buguroo
Build38
Candiru
Cellebrite
Cellusys
Censys
Certo
CheckPoint
Checkmarx
Cisco Talos
Citizen Lab
Cleafy
CloudFlare
CloudSEK
Cofense
CrowdStrike
Crowdfense
CTM360
Cyble
CYFIRMA
Cytrox
D3Lab
DarkOwl
Data Theorem
Detego
Digital.ai
DomainTools
Dr.Web
Elcomsoft
EMVCo
Enea
ENISA
Enki
ESET
F-Secure
F6
Feedzai
FinFisher
Flashpoint
Fortinet
Google
Grayshift
Group-IB
GSMA
Guardsquare
HackerOne
HarfangLab
HCL AppScan
Hex-Rays
HUMAN Security
Hunt.io
Huorong
Hybrid Analysis
IBM
ImmuniWeb
Intel 471
Intellexa
Intigriti
iVerify
Joe Sandbox
K7
Kaspersky
KELA
Kochava
Licel
Lookout
Magnet Forensics
Malwarebytes
Mandiant
McAfee
Memento Labs
Microsoft
MITRE
MOBILedit
MobSF
MSAB
NCC Group
NIST
NowSecure
NSO Group
Operation Zero
Oversecured
OWASP
Oxygen Forensics
Palo Alto
Paraben
PCI SSC
PNF Software
Pradeo
PREBYTES
Prodaft
Promon
Qihoo 360
QuickHeal
Quokka
RCS Labs
Recorded Future
Resecurity
ReversingLabs
S2W
Sardine
Secure Blink
Sekoia
SentinelOne
Shindan
Shodan
Sift
Silent Push
SonicWall
Sophos
Susteen
Synack
Synopsys
Tencent
ThreatFabric
ThreatMon
Trellix
TrendMicro
Triage
Trustwave
Validin
Variston
Veracode
Verimatrix
VirusTotal
VMRay
Volexity
XLab
YesWeHack
Zero Day Initiative
Zerodium
Zimperium
Zscaler
Resources
Resources
Blogs & Research
Community
Conferences & Talks
Frameworks & Standards
Reports & Research
Tools
Training & CTFs
BioCatch
¶
https://www.biocatch.com/blog
Back to top