Reyyan Ahmed

Security

I reverse-engineer APKs for fun. The bug bounties are a bonus.

4Reports Filed
3Triaged
1Informative
100%Valid Rate
Vulnerability Reports
H1-2026-001MediumTriaged
█████████ / ███████
JavaScript Bridge Exposure in Android WebView

Identified exposed JavaScript bridge interfaces in the target’s Android application WebView implementation, enabling potential data exfiltration through malicious page injection.

H1-2026-002HighTriaged
██████
WebView Misconfiguration, Supply Chain Module

Critical WebView configuration flaw in the supply-chain facing Android module allowing JavaScript execution in privileged context.

H1-2026-003MediumInformative
████████ ██████
Insecure Deep Link Handling

Improper validation in deep link routing mechanism could allow unauthorized navigation to privileged in-app screens.

H1-2026-004LowTriaged
██████
API Key Exposure in Client Bundle

Third-party API keys exposed in the production JavaScript bundle, accessible via standard APK reverse engineering.

Methodology
01
Target Acquisition

APK download, version pinning, scope validation against program policy.

02
Static Analysis

Decompile with jadx, review AndroidManifest for exported components, search for hardcoded secrets and misconfigurations.

03
Dynamic Analysis

Frida hooks for runtime inspection, Burp proxy for traffic interception, WebView JavaScript bridge enumeration.

04
Report & Disclose

Write clear reproduction steps, assess CVSS, submit through HackerOne with full PoC.

Research Areas
Android Physical Access Red Team

Researching since class 10th. Bypass techniques for lockscreens, ADB exploitation, bootloader manipulation, and forensic data extraction on Android devices.

APT Threat Intelligence

Building knowledge bases covering Advanced Persistent Threat groups across multiple nation-states. TTPs, attribution indicators, and tooling analysis.