Commando-X / vuln-bank-mobileLinks
A deliberately vulnerable mobile banking application designed for practicing mobile security testing. Features common vulnerabilities found in real-world applications, making it an ideal platform for security professionals, developers, and enthusiasts to learn mobile penetration testing..
☆27Updated last month
Alternatives and similar repositories for vuln-bank-mobile
Users that are interested in vuln-bank-mobile are comparing it to the libraries listed below
Sorting:
- ☆46Updated 3 months ago
- A New Approach to Directory Bruteforce with WaybackLister v1.0☆101Updated 2 weeks ago
- A passive way to find backups/ sensitive information.☆80Updated 2 weeks ago
- ☆131Updated 2 months ago
- Bash scripts to automate the burpsuite's certificate configuration and proxying of an Android device for penetration test.☆15Updated last week
- SubOwner - A Simple tool check for subdomain takeovers.☆112Updated 7 months ago
- A collection of config files for linux focusing on hackthebox theme☆45Updated 5 months ago
- A deliberately vulnerable banking application designed for practicing secure code reviews and API security testing. Features common vulne…☆216Updated this week
- Welcome SecToolkit repository! This is a comprehensive collection of cybersecurity and bug bounty hunting topics. Here, you'll find a var…☆39Updated this week
- 🪄 XSSDynaGen is a tool designed to analyze URLs with parameters, identify the characters allowed by the server, and generate advanced XS…☆53Updated 5 months ago
- Bug Bounty Web and API Payloads☆35Updated 7 months ago
- Python for AWAE (Advanced Web Attacks and Exploitation)☆95Updated last year
- AI/LLM local model integration for analysis of reconftw results☆58Updated last month
- ☆12Updated last month
- A Go-based utility that processes input through multiple AI models concurrently (OpenAI, Claude, and Gemini) and provides a summarized co…☆61Updated last month
- Scripts, files, cheatsheets and more used for pentesting and my OSWE / AWAE exam.☆88Updated 3 weeks ago
- A Powerful Recon Engine☆63Updated 6 months ago
- A checklist for systematically going through the OWASP Testing Guide V4☆16Updated 4 months ago
- A tool for inspecting and analyzing mobile application storage files.☆40Updated 3 weeks ago
- This repository contains my writeups for the labs in PortSwigger's Web Security Academy platform. Each lab writeup includes the lab's nam…☆94Updated last month
- Very Vulnerable Management API (VVMA) is a deliberately insecure RESTful API built with Node.js for educational and testing purposes. It …☆59Updated this week
- IDOR Forge is an advanced and versatile tool designed to detect Insecure Direct Object Reference (IDOR) vulnerabilities in web applicatio…☆137Updated 3 weeks ago
- A list of all Active Directory machines from HackTheBox☆60Updated this week
- ☆64Updated 2 months ago
- ☆62Updated this week
- Frogy 2.0 is an automated external reconnaissance and Attack Surface Management (ASM) toolkit☆100Updated 2 weeks ago
- Private Nuclei Templates☆99Updated 3 months ago
- This is my personal repo, which includes bug bounty tips, a collection of tools, one-liners, and other resources I personally prefer whil…☆54Updated last month
- Grep subdomains from web pages.☆42Updated 3 months ago
- A Simple JS code to keylogger data and send it to the personal server☆31Updated 5 months ago