SECFORCE / droidgroundLinks
A customizable playground for Android CTF challenges.
☆80Updated last month
Alternatives and similar repositories for droidground
Users that are interested in droidground are comparing it to the libraries listed below
Sorting:
- A burp for intents wannabe☆69Updated last year
- ☆73Updated last month
- Slides and videos from my public speeches / conferences☆76Updated 3 months ago
- A list of bizarre crackmes☆122Updated 2 months ago
- LLM tool to deobfuscate android app and find any potential vulnerabilities in android apps and code.☆234Updated this week
- Oversecured Vulnerable iOS App☆224Updated last year
- Beetlebug is an open source insecure Android application with CTF challenges built for Android Penetration Testers and Bug Bounty hunters…☆111Updated last year
- Deluder is a tool for intercepting traffic of proxy unaware applications. Currently, Deluder supports OpenSSL, GnuTLS, SChannel, WinSock …☆201Updated 10 months ago
- Android BugBazaar: Your mobile appsec playground to Explore, Exploit, Excel☆55Updated last year
- This repository contains the mobile Proof of Concept (POC) tester for CTF challenges. The POC tester is a web application that allows use…☆17Updated 10 months ago
- The resources for glibc Malloc heap exploitation course by Maxwell Dulin and Security Innovation.☆163Updated 9 months ago
- frida-codeshare-scripts.collection of useful FRIDA scripts.A curated list of Frida resources.☆85Updated 3 months ago
- Scripts and examples for "From Day Zero to Zero Day" by Eugene Lim.☆121Updated this week
- ☆87Updated last year
- An intentionally vulnerable Android Application to demonstrate various vulnerabilities that airses in Android Components.☆36Updated 4 months ago
- Run the Medusa Android framework inside a docker container on x86 or ARM☆36Updated 2 years ago
- The most complete code auditing platform with thousands of real-world challenges☆125Updated 2 months ago
- list of organizations offering vulnerability research/reverse engineering jobs☆75Updated this week
- Checks if an Android application has successfully completed the "App Link Verification" process for Android App Links.☆59Updated last year
- ☆18Updated last year
- Real Android malware apps discussed in the book☆38Updated last year
- Manage (and soon deploy) Android machines with pre-defined behaviors for Cyber Range environments.☆86Updated last year
- Detect code obfuscation through text classification in the detection process.☆45Updated last year
- Type diagram plugin for JADX decompiler☆65Updated 6 months ago
- ☆23Updated 9 months ago
- Proof-of-concept code for Android APEX key reuse vulnerability☆98Updated last year
- External Playbooks for Public Access☆39Updated 6 months ago
- An automatic Blind ROP exploitation tool☆204Updated 2 years ago
- A collection of Semgrep rules derived from the OWASP MASTG specifically for Android applications.☆292Updated last year
- A python module to explore the object tree to extract paths to interesting objects in memory.☆101Updated 6 months ago