Created by High-Tech Bridge, the Purposefully Insecure and Vulnerable Android Application (PIVAA) replaces outdated DIVA for benchmark of mobile vulnerability scanners.
☆106May 27, 2020Updated 5 years ago
Alternatives and similar repositories for pivaa
Users that are interested in pivaa are comparing it to the libraries listed below
Sorting:
- Test Android Application.☆20Jan 22, 2016Updated 10 years ago
- ☆42Jul 16, 2018Updated 7 years ago
- Android security workshop material taught during the CyberTruck Challenge 2019 (Detroit USA).☆103Aug 17, 2021Updated 4 years ago
- Insecure Vulnerable Android Application that helps to learn hacing and securing apps☆21Oct 4, 2015Updated 10 years ago
- Some tools☆10Dec 5, 2017Updated 8 years ago
- An open source Android application that is intentionally vulnerable so as to act as a learning platform for Android application security …☆223Dec 23, 2021Updated 4 years ago
- Windows login backdoor diagnostic tool☆11Apr 2, 2017Updated 8 years ago
- Demos presented on Hackerfest 2015☆14Nov 9, 2015Updated 10 years ago
- Oversecured Vulnerable Android App☆732Jul 18, 2024Updated last year
- Vulnerable Android application for developers and security enthusiasts to learn about Android insecurities☆1,406Apr 17, 2024Updated last year
- Framework for vulnerability fuzzing and reverse-engineering tool development.☆23Jul 25, 2023Updated 2 years ago
- Java Object Deserialization on Android☆86Apr 11, 2019Updated 6 years ago
- A smali emulator.☆25Jun 27, 2018Updated 7 years ago
- A new technique to bypass microsoft's applocker.☆12May 27, 2015Updated 10 years ago
- Hidden monitoring and blocking Android apps☆10May 2, 2017Updated 8 years ago
- Mobile security trainings based on android☆107Nov 12, 2020Updated 5 years ago
- A vulnerable Android application that shows simple examples of vulnerabilities in a ctf style.☆741Jun 25, 2021Updated 4 years ago
- Android Digital Bank Vulnerable Mobile App☆37Aug 15, 2015Updated 10 years ago
- This repository is a suplimentary material for Android Training's done by Anant Shrivastava from 2012-2017☆222Jan 4, 2021Updated 5 years ago
- PowerShell script to bypass UAC using DCCW☆19Jul 29, 2017Updated 8 years ago
- Microsoft Office / COM Object DLL Planting☆15May 14, 2016Updated 9 years ago
- A demo app vulnerable to directory traversal☆15May 3, 2020Updated 5 years ago
- Damn Vulnerable Hybrid Mobile App (DVHMA) is an hybrid mobile app (for Android) that intentionally contains vulnerabilities.☆269Aug 22, 2018Updated 7 years ago
- VyAPI - A cloud based vulnerable hybrid Android App☆86Feb 21, 2020Updated 6 years ago
- Dynamic android vulnerability scanner using OpenNebula and Android-x86 emulators.☆42Feb 24, 2017Updated 9 years ago
- An Intentionally designed Vulnerable Android Application built in Kotlin.☆256Mar 2, 2022Updated 3 years ago
- Intercept, modify, repeat and attack Android's Binder transactions using Burp Suite☆323Aug 20, 2017Updated 8 years ago
- Collection of my test rules and Submissions to Emerging-Sigs☆11Apr 22, 2016Updated 9 years ago
- x86 emulator with DOS [unofficial mirror]☆12Oct 13, 2025Updated 4 months ago
- ☆16Nov 10, 2015Updated 10 years ago
- ☆10Apr 8, 2018Updated 7 years ago
- Web based application for managing your Sourcemod servers and users☆13Aug 8, 2014Updated 11 years ago
- Writing a 32-bit Protected Mode OS in NASM☆13Jun 22, 2012Updated 13 years ago
- A system call tracer☆10Sep 22, 2014Updated 11 years ago
- My solutions for random crackmes and other challenges☆12Dec 23, 2019Updated 6 years ago
- Lists work items being queued currently.☆14Jun 7, 2015Updated 10 years ago
- Intel-Process communitation☆10Feb 27, 2017Updated 9 years ago
- Prototype for an in memory fuzzer☆13Aug 1, 2017Updated 8 years ago
- ☆17Oct 15, 2017Updated 8 years ago