Android security guides, roadmap, docs, courses, write-ups, and teryaagh.
β793Sep 19, 2025Updated 5 months ago
Alternatives and similar repositories for Android-Security-Teryaagh
Users that are interested in Android-Security-Teryaagh are comparing it to the libraries listed below
Sorting:
- A curated list of Android Security materials and resources For Pentesters and Bug Huntersβ1,868May 5, 2025Updated 10 months ago
- Runtime Mobile Security (RMS) π±π₯ - is a powerful web interface that helps you to manipulate Android and iOS Apps at Runtimeβ2,978Updated this week
- Oversecured Vulnerable Android Appβ731Jul 18, 2024Updated last year
- Mobile Edge-Dynamic Unified Security Analysisβ2,183Feb 26, 2026Updated last week
- A big list of Android Hackerone disclosed reports and other resources.β1,672Sep 10, 2025Updated 5 months ago
- A Bash wrapper for radamsa that can be used to fuzz exported activities and deep links.β52Aug 17, 2021Updated 4 years ago
- A security focused static analysis tool for Android and Java applications.β1,217Feb 28, 2026Updated last week
- The Mobile App Pentest cheat sheet was created to provide concise collection of high value information on specific mobile application penβ¦β5,154Feb 8, 2024Updated 2 years ago
- The motive to build this repo is to help beginner to start learn Android Pentesting by providing a roadmap.β436Jul 11, 2022Updated 3 years ago
- An actively maintained, Self curated notes related to android application security for security professionals, bugbounty hunters, pentesβ¦β225Aug 26, 2021Updated 4 years ago
- [Official] Android reverse engineering tool focused on dynamic instrumentation automation leveraging Frida. It disassembles dex, analyzesβ¦β1,120Feb 2, 2023Updated 3 years ago
- This repository is a suplimentary material for Android Training's done by Anant Shrivastava from 2012-2017β222Jan 4, 2021Updated 5 years ago
- A vulnerable Android application that shows simple examples of vulnerabilities in a ctf style.β742Jun 25, 2021Updated 4 years ago
- This repository explain how to write frida hook scripts and analysis written hooks.β87Jun 13, 2023Updated 2 years ago
- Basics on commands/tools/info on how to assess the security of mobile applicationsβ1,651Dec 19, 2023Updated 2 years ago
- β96Mar 2, 2022Updated 4 years ago
- π A list of writeups from the Google VRP Bug Bounty programβ1,452Feb 7, 2026Updated last month
- β81Oct 12, 2021Updated 4 years ago
- β65Aug 11, 2021Updated 4 years ago
- This is a curated list of mobile based CTFs, write-ups and vulnerable apps. Most of them are android based due to the popularity of the pβ¦β1,123Jun 26, 2022Updated 3 years ago
- APKHunt is a comprehensive static code analysis tool for Android apps that is based on the OWASP MASVS framework. Although APKHunt is intβ¦β956Jan 17, 2025Updated last year
- Collection of methodology and test case for various web vulnerabilities.β7,039Jun 25, 2025Updated 8 months ago
- Scanning APK file for URIs, endpoints & secrets.β5,982Aug 20, 2025Updated 6 months ago
- A Collection of Android (Samsung) Security Research Referencesβ465Jul 16, 2025Updated 7 months ago
- β352Aug 29, 2024Updated last year
- The OWASP Mobile Application Security Testing Guide (MASTG) is a comprehensive manual for mobile app security testing and reverse engineeβ¦β12,748Updated this week
- A collection of awesome API Security tools and resources. The focus goes to open-source tools and resources that benefit all the communitβ¦β3,645Nov 23, 2025Updated 3 months ago
- A tool to automate the boring process of APK reconβ345Sep 30, 2022Updated 3 years ago
- fpicker is a Frida-based fuzzing suite supporting various modes (including AFL++ in-process fuzzing)β290Jul 24, 2025Updated 7 months ago
- Mind-Maps of Several Thingsβ2,625Jun 29, 2023Updated 2 years ago
- The repo contains a series of challenges for learning Frida for Android Exploitation.β1,223Feb 22, 2026Updated last week
- Extract endpoints from APK filesβ882May 22, 2024Updated last year
- β436Jun 1, 2021Updated 4 years ago
- Keyhacks is a repository which shows quick ways in which API keys leaked by a bug bounty program can be checked to see if they're valid.β6,082Aug 14, 2024Updated last year
- An effort to build a single place for all useful android and iOS security related stuff. All references and tools belong to their respectβ¦β3,426Mar 1, 2024Updated 2 years ago
- A comprehensive resource for Android static analysis and vulnerability assessment. Tutorials, tools, and resources for identifying and miβ¦β178Jul 6, 2023Updated 2 years ago
- All about bug bounty (bypasses, payloads, and etc)β6,658Sep 8, 2023Updated 2 years ago
- A Collection of Notes, Checklists, Writeups on Bug Bounty Hunting and Web Application Security.β1,977Sep 5, 2021Updated 4 years ago
- Mobile penetration testing android & iOS command cheatsheetβ384Jan 29, 2026Updated last month