A deliberately vulnerable mobile banking application designed for practicing mobile security testing. Features common vulnerabilities found in real-world applications, making it an ideal platform for security professionals, developers, and enthusiasts to learn mobile penetration testing..
☆80Nov 25, 2025Updated 3 months ago
Alternatives and similar repositories for vuln-bank-mobile
Users that are interested in vuln-bank-mobile are comparing it to the libraries listed below
Sorting:
- A deliberately vulnerable banking application designed for practicing Security Testing of Web App, APIs, AI integrated App and secure cod…☆596Nov 23, 2025Updated 3 months ago
- Welcome to the Very Vulnerable Lambda Application repository! This repository contains an intentionally vulnerable serverless applicatio…☆11Jul 22, 2024Updated last year
- ☆15Apr 13, 2021Updated 4 years ago
- A bash tool used to install famous bug bounty tools. Mainly used when setting up a fresh environment.☆16Mar 20, 2023Updated 2 years ago
- USRLINKS v1.0 - The Ultimate Username Reconnaissance Tool☆24Oct 6, 2025Updated 5 months ago
- Very Vulnerable Management API (VVMA) is a deliberately insecure RESTful API built with Node.js for educational and testing purposes. It …☆70Jun 5, 2025Updated 9 months ago
- An MCP Server for Pwndoc (Pentesting Reporting Tool)☆39Jan 23, 2026Updated last month
- HackList: Your go-to AI-powered guide to hands-on cybersecurity learning!☆24Jul 6, 2025Updated 8 months ago
- All the code snippets from my Secure Code Review series on youtube (youtube.com/@muqsitbaig)!☆25Jul 28, 2024Updated last year
- Scripted Local Linux Enumeration & Privilege Escalation Checks☆19Mar 26, 2019Updated 6 years ago
- ☆20Sep 2, 2021Updated 4 years ago
- This repo contains my pentesting template that I have used in PWK and for current assessments. The template has been formatted to be used…☆25Apr 19, 2022Updated 3 years ago
- Collection of rules and debug data for hashcat☆25Dec 2, 2025Updated 3 months ago
- zwatcher is a lightweight bash script for monitoring sub/domains or a list of sub/domains and javascript files. It compares HTTP status c…☆21Nov 23, 2025Updated 3 months ago
- Burp Extension to identify PII data☆21Jan 29, 2021Updated 5 years ago
- ☆43Aug 27, 2025Updated 6 months ago
- bash script for automating subdomain enumeration process either passive or active☆29Feb 24, 2026Updated 2 weeks ago
- Gouge is a simple Burp extension to extract or gouge all URLs which are seen in JS files as you visit different websites/webpages in Burp…☆28Jul 21, 2024Updated last year
- Check for CVE-2024-22024 vulnerability in Ivanti Connect Secure☆30Feb 9, 2024Updated 2 years ago
- Pure PowerShell port of PassTheCert tool to authenticate to an LDAP/S server with a certificate through Schannel☆61Apr 13, 2025Updated 10 months ago
- ☆27Jun 18, 2024Updated last year
- Url scrapper or extractor from alienvault☆38Mar 1, 2025Updated last year
- ☆41Aug 8, 2023Updated 2 years ago
- ☆30Aug 22, 2019Updated 6 years ago
- CVE-2024-24919 [Check Point Security Gateway Information Disclosure]☆32Jun 2, 2024Updated last year
- Bug Bounty Methodology-slides by Muhammad M. Awali. Pentesting and Researcher Talks.☆31Feb 17, 2023Updated 3 years ago
- My Notes on Regular Expressions for AWAE/OSWE.☆37Sep 5, 2023Updated 2 years ago
- workshop about cloud-native security☆71Apr 14, 2022Updated 3 years ago
- c4mund0n60 is a tool that use output of known tools for generate smart information about a domain☆11Sep 20, 2023Updated 2 years ago
- ☆15Mar 21, 2025Updated 11 months ago
- CTFd plugin allowing for individual Docker containers per user or team☆10Oct 14, 2024Updated last year
- Contains compiled binaries of Volatility☆36May 18, 2025Updated 9 months ago
- A collection of slides and presentations from BSides Ahmedabad 2024, held on October 12th and 13th. This repository features key insights…☆39Oct 17, 2024Updated last year
- A curated list of awesome Penetration Testing Tools ported to Google Colab to make faster and easier to execute and test.☆38Oct 31, 2024Updated last year
- At this repo you can find any tools, tricks or templates for general penetration testing assesment☆15Apr 27, 2024Updated last year
- Driver Reverse & Exploitation☆82Sep 4, 2025Updated 6 months ago
- My collection of Semgrep rules for vulnerability detection on source code (swift, java, cobol)☆43Dec 3, 2025Updated 3 months ago
- Looks for parameters in urls☆34Oct 14, 2024Updated last year
- Proof-of-concept program that is able to read and write arbitrary bits using HTTP server-side caching☆38Jul 14, 2017Updated 8 years ago