As a bug hunter, are your bug bounty reports getting rejected because you don't use a "malicious" Proof of Concept (PoC) app to exploit the vulnerabilities? I've got you covered!
-
Updated
Jul 22, 2025 - Java
As a bug hunter, are your bug bounty reports getting rejected because you don't use a "malicious" Proof of Concept (PoC) app to exploit the vulnerabilities? I've got you covered!
A Proof of Concept for demonstrating Task hijacking in Android using an attacker and a victim app.
Add a description, image, and links to the task-hijacking topic page so that developers can more easily learn about it.
To associate your repository with the task-hijacking topic, visit your repo's landing page and select "manage topics."