Commando-X / vuln-bank-mobileView external linksLinks
A deliberately vulnerable mobile banking application designed for practicing mobile security testing. Features common vulnerabilities found in real-world applications, making it an ideal platform for security professionals, developers, and enthusiasts to learn mobile penetration testing..
☆78Nov 25, 2025Updated 2 months ago
Alternatives and similar repositories for vuln-bank-mobile
Users that are interested in vuln-bank-mobile are comparing it to the libraries listed below
Sorting:
- Bash scripts to automate the burpsuite's certificate configuration and proxying of an Android device for penetration test.☆19May 26, 2025Updated 8 months ago
- A deliberately vulnerable banking application designed for practicing Security Testing of Web App, APIs, AI integrated App and secure cod…☆580Nov 23, 2025Updated 2 months ago
- Welcome to the Very Vulnerable Lambda Application repository! This repository contains an intentionally vulnerable serverless applicatio…☆11Jul 22, 2024Updated last year
- Zero trust. Zero security. Total exposure. A deliberately vulnerable health tech platform with AI Chatbot for learning about application …☆40Jun 15, 2025Updated 8 months ago
- A bash tool used to install famous bug bounty tools. Mainly used when setting up a fresh environment.☆17Mar 20, 2023Updated 2 years ago
- An MCP Server for Pwndoc (Pentesting Reporting Tool)☆37Jan 23, 2026Updated 3 weeks ago
- USRLINKS v1.0 - The Ultimate Username Reconnaissance Tool☆24Oct 6, 2025Updated 4 months ago
- Very Vulnerable Management API (VVMA) is a deliberately insecure RESTful API built with Node.js for educational and testing purposes. It …☆69Jun 5, 2025Updated 8 months ago
- Smilex-Eye is a high-speed, advanced OSINT suite that bridges the gap between raw global internet data and actionable security intelligen…☆33Jan 4, 2026Updated last month
- HackList: Your go-to AI-powered guide to hands-on cybersecurity learning!☆24Jul 6, 2025Updated 7 months ago
- Scripted Local Linux Enumeration & Privilege Escalation Checks☆19Mar 26, 2019Updated 6 years ago
- All the code snippets from my Secure Code Review series on youtube (youtube.com/@muqsitbaig)!☆25Jul 28, 2024Updated last year
- This repo contains my pentesting template that I have used in PWK and for current assessments. The template has been formatted to be used…☆25Apr 19, 2022Updated 3 years ago
- ☆43Aug 27, 2025Updated 5 months ago
- Publications from the eBPF foundation☆28Dec 3, 2025Updated 2 months ago
- bash script for automating subdomain enumeration process either passive or active☆29Dec 17, 2024Updated last year
- Check for CVE-2024-22024 vulnerability in Ivanti Connect Secure☆30Feb 9, 2024Updated 2 years ago
- Gouge is a simple Burp extension to extract or gouge all URLs which are seen in JS files as you visit different websites/webpages in Burp…☆28Jul 21, 2024Updated last year
- Pure PowerShell port of PassTheCert tool to authenticate to an LDAP/S server with a certificate through Schannel☆59Apr 13, 2025Updated 10 months ago
- Tools for bug bounty☆29Jul 9, 2025Updated 7 months ago
- Checker de cuentas Blim para android [TERMUX]☆11Jan 21, 2019Updated 7 years ago
- ☆27Jun 18, 2024Updated last year
- Read PostgreSQL data files without credentials - forensics, data recovery, and security research tool☆34Jan 18, 2026Updated 3 weeks ago
- A comprehensive bug bounty methodology compiled from extensive research, covering web application reconnaissance, checklists, and methods…☆116Nov 11, 2024Updated last year
- Url scrapper or extractor from alienvault☆38Mar 1, 2025Updated 11 months ago
- ☆41Aug 8, 2023Updated 2 years ago
- ☆30Aug 22, 2019Updated 6 years ago
- A collection of slides and presentations from BSides Ahmedabad 2024, held on October 12th and 13th. This repository features key insights…☆38Oct 17, 2024Updated last year
- CVE-2024-24919 [Check Point Security Gateway Information Disclosure]☆32Jun 2, 2024Updated last year
- Bug Bounty Methodology-slides by Muhammad M. Awali. Pentesting and Researcher Talks.☆31Feb 17, 2023Updated 2 years ago
- My Notes on Regular Expressions for AWAE/OSWE.☆37Sep 5, 2023Updated 2 years ago
- My collection of Semgrep rules for vulnerability detection on source code (swift, java, cobol)☆41Dec 3, 2025Updated 2 months ago
- workshop about cloud-native security☆71Apr 14, 2022Updated 3 years ago
- Contains compiled binaries of Volatility☆36May 18, 2025Updated 8 months ago
- CTFd plugin allowing for individual Docker containers per user or team☆10Oct 14, 2024Updated last year
- A curated list of awesome Penetration Testing Tools ported to Google Colab to make faster and easier to execute and test.☆38Oct 31, 2024Updated last year
- At this repo you can find any tools, tricks or templates for general penetration testing assesment☆15Apr 27, 2024Updated last year
- ☆15Mar 21, 2025Updated 10 months ago
- Driver Reverse & Exploitation☆82Sep 4, 2025Updated 5 months ago