This is a curated list of mobile based CTFs, write-ups and vulnerable apps. Most of them are android based due to the popularity of the platform.
☆33Nov 21, 2024Updated last year
Alternatives and similar repositories for The-Mobile-CTF-Lab
Users that are interested in The-Mobile-CTF-Lab are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Web 3.0 Security resources☆16Oct 12, 2023Updated 2 years ago
- A simple and classic Sudoku Game build in Android Studio with Kotlin for Android Users.☆17Feb 16, 2023Updated 3 years ago
- Official Writeup of SUCTF 2025☆66Feb 25, 2025Updated last year
- Papers and Presentations from the DFRWS Conferences☆20Jul 12, 2022Updated 3 years ago
- ☆12Dec 31, 2019Updated 6 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Pakistan Cyber Security Challenge - 2023 CTF☆15Aug 14, 2025Updated 7 months ago
- CSF Firewall and AbuseIPDB API integration with specific focus on data privacy and prevention of sensitive data leaked to public AbuseIPD…☆16Mar 20, 2024Updated 2 years ago
- Python tool to parse and decrypt files quarantined by windows defender☆13Feb 25, 2023Updated 3 years ago
- Agentic C2-style MCP server for Frida instrumentation on rooted Android and jailbroken iOS.☆44Mar 18, 2026Updated last week
- A curated list of Capture The Signal CTF related stuff☆17Oct 5, 2021Updated 4 years ago
- Python utility for parsing Maui AssemblyStore blob file☆37Apr 14, 2025Updated 11 months ago
- This repository contains the setup from Paradigm CTF blockchain challenges based on the original repository. We've introduced new featur…☆48Oct 4, 2025Updated 5 months ago
- ☆23Jan 27, 2026Updated last month
- A Ghidra script to aid reverse engineering of Android native (.so) libraries, by identifying dynamically registered functions within the …☆16Feb 27, 2024Updated 2 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- ☆18Aug 15, 2025Updated 7 months ago
- A framework for basic hacks including aimbot & ESP, OpenGL Drawing and more☆15Jul 22, 2023Updated 2 years ago
- Keygen for Positive Technologies Network Attack Detector☆34Dec 7, 2023Updated 2 years ago
- Auto Frida is a powerful, all-in-one automation toolkit that handles everything from Frida installation to script injection. Zero manual …☆68Mar 3, 2026Updated 3 weeks ago
- As I work thought the book "Practical Binary Analysis" by Dennis Andriesse, https://practicalbinaryanalysis.com/ I try to make editions f…☆11Sep 28, 2021Updated 4 years ago
- Foundry-like interface for interacting with the Ethereum application in python with extra features for solving CTF Challenges using the w…☆42Jul 31, 2025Updated 7 months ago
- Defending against malicious USB firmware in the Linux kernel☆17Mar 8, 2016Updated 10 years ago
- An intentionally vulnerable Android Application to demonstrate various vulnerabilities that airses in Android Components.☆43Apr 11, 2025Updated 11 months ago
- ☆22Feb 24, 2024Updated 2 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Preparation of Attack & Defense CTF for iHack 2022☆16Nov 28, 2023Updated 2 years ago
- ☆15Jul 28, 2024Updated last year
- Dalvik bytecode emulator for Android static analysis | String decryption | Multi-DEX | No Android runtime required☆87Jan 3, 2026Updated 2 months ago
- All the code snippets from my Secure Code Review series on youtube (youtube.com/@muqsitbaig)!☆25Jul 28, 2024Updated last year
- ☆19Mar 13, 2022Updated 4 years ago
- Materials from the CS Level-Up trainers☆11Aug 10, 2025Updated 7 months ago
- BookMark and Find Subdomains, Endpoints, External Domains in your web browser.☆28Aug 1, 2025Updated 7 months ago
- A repo about CTF challenges that I made at several CTF events☆14Mar 20, 2025Updated last year
- Herramienta de extracción de exploits desde Shodan Exploits para facilitar la búsqueda de vulnerabilidades conocidas. 👁☆39Sep 20, 2025Updated 6 months ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- A library and CLI to solve, check, and generate proof-of-work challenges using kCTF's scheme.☆16Mar 6, 2026Updated 3 weeks ago
- Docker configuration (and only docker configuration) files for hosting self-hosted Hexvault, Lumina and Hexlicsrv.☆46Sep 12, 2025Updated 6 months ago
- A Unified Platform for Evaluating SAST Tools for Android☆20Mar 30, 2025Updated 11 months ago
- os_log command line tool implementation for iOS☆13Feb 18, 2022Updated 4 years ago
- ☆11Jul 26, 2022Updated 3 years ago
- Official writeups for University CTF 2023: Brains & Bytes☆105Dec 4, 2024Updated last year
- Tyrant is a malicious tool used for penetration testing and remote control persistence.☆39Feb 3, 2025Updated last year