SECFORCE / droidgroundLinks
A customizable playground for Android CTF challenges.
☆84Updated last week
Alternatives and similar repositories for droidground
Users that are interested in droidground are comparing it to the libraries listed below
Sorting:
- Slides and videos from my public speeches / conferences☆76Updated 4 months ago
- A burp for intents wannabe☆71Updated last year
- ☆77Updated 3 months ago
- Beetlebug is an open source insecure Android application with CTF challenges built for Android Penetration Testers and Bug Bounty hunters…☆115Updated 2 years ago
- A list of bizarre crackmes☆122Updated 3 months ago
- LLM tool to deobfuscate android app and find any potential vulnerabilities in android apps and code.☆256Updated 2 weeks ago
- Oversecured Vulnerable iOS App☆230Updated last year
- Android BugBazaar: Your mobile appsec playground to Explore, Exploit, Excel☆55Updated last year
- Official writeups for Business CTF 2024: The Vault Of Hope☆156Updated 10 months ago
- Scripts and examples for "From Day Zero to Zero Day" by Eugene Lim.☆156Updated last month
- Some Useful Tricks for Pentest Android and iOS Apps☆145Updated 3 weeks ago
- Checks if an Android application has successfully completed the "App Link Verification" process for Android App Links.☆61Updated last year
- ☆88Updated last year
- Deluder is a tool for intercepting traffic of proxy unaware applications. Currently, Deluder supports OpenSSL, GnuTLS, SChannel, WinSock …☆205Updated last year
- An intentionally vulnerable Android Application to demonstrate various vulnerabilities that airses in Android Components.☆36Updated 5 months ago
- A python module to explore the object tree to extract paths to interesting objects in memory.☆102Updated 8 months ago
- APK downloader from few sources☆139Updated last month
- Reverse engineering CTFs.☆54Updated this week
- The Android Penetration Testing Steps repository is intended for security professionals, penetration testers, developers, and anyone who …☆126Updated 2 years ago
- As a bug hunter, are your bug bounty reports getting rejected because you don't use a "malicious" Proof of Concept (PoC) app to exploit t…☆37Updated last week
- SSL bypass check☆286Updated 8 months ago
- A collection of Semgrep rules derived from the OWASP MASTG specifically for Android applications.☆301Updated last year
- Collection of CTF Writeups for various ctfs. Mostly focused on reverse engineering, and contains all source files if they were available.☆58Updated 2 years ago
- The resources for glibc Malloc heap exploitation course by Maxwell Dulin and Security Innovation.☆164Updated 10 months ago
- Official writeups for University CTF 2023: Brains & Bytes☆104Updated 10 months ago
- Detect code obfuscation through text classification in the detection process.☆44Updated last year
- ☆18Updated last year
- A lightweight Python-based tool to extract and enumerate Android components and automatically generate practical ADB commands☆85Updated 3 months ago
- Massive Mobile Security Framework☆294Updated last month
- Official writeups for Hack The Boo CTF 2023☆45Updated 10 months ago