Our Research

We conduct cutting-edge research in mobile security, focusing on vulnerability analysis, exploit development, and security tooling. Our work contributes to the broader security community through open-source projects and publications.

Research Areas

Mobile Security

Advanced research in Android and iOS security, including application security, and runtime analysis.

ARM Architecture

Deep dive into ARM architecture security.

Security Tooling

Development of innovative security tools and frameworks for mobile security analysis and penetration testing.

Training

Providing cybersecurity awareness sessions and specialized mobile security trainings to strengthen the capabilities of your employees and executives

Recent Publications

R2Con - A Hitchhikers Guide for Unity: Reversing iOS games

September 2023

How to reverse engineer and dinamically manipulate Unity games in iOS.

Go to publication

RingZero - Mobile Reverse Engineering with R2frida Training

February 2023 (Texas) / August 2023 (Vegas)

How to reverse engineer iOS mobile applications using r2frida.

Go to publication

Navajas Negras - To the Upside Down and Back: Destapando CVEs en Android

September 2022

Automatically uncovering CVEs in Android using CodeQL, radare2 and Frida.

Go to publication

R2Con - r2Frida Kung Fu

September 2021

Pratical perspective for reverse engineering iOS applications using r2frida.

Go to publication

R2Con - Mobile Reverse Engineering with R2frida Training

September 2019 / September 2020

How to bypass security detection mechanisms in iOS devices using r2frida.

Go to publication

AUSAPE - Hackeando a SAPiendas

June 2018

Hacking a SAP system through a VPN built in a compromise Android mobile phone.

Go to publication

R2Clutch, decrypting iOS applications – Speaker at R2Con Conference

September 2016

Building an application to decrypt iOS applications using Radare2 via r2pipe.

Go to publication

V Jornadas CCN-CERT - iPhone Attacks

December 2011

Building an environment to compromise an iPhone using a kill-chain of different vulnerabilities to steal sensitive information from the device without any user interaction.

Go to publication

Interested in our research? Contact us at work at 0xmurphy.me