An exercise to research and explore the best ways to hide a secret in the code of a mobile app. Article: https://blog.approov.io/how-to-extract-an-api-key-from-a-mobile-app-with-static-binary-analysis
☆24Feb 22, 2019Updated 7 years ago
Alternatives and similar repositories for android-hide-secrets
Users that are interested in android-hide-secrets are comparing it to the libraries listed below
Sorting:
- bypass new soc qualcom☆10Jan 27, 2021Updated 5 years ago
- This tool is for flashing qualcomm devices.☆10Feb 22, 2021Updated 5 years ago
- find active domains from list of subdomains☆27May 30, 2020Updated 5 years ago
- The original slurp source☆32Nov 25, 2018Updated 7 years ago
- A Static and Extensible Black-box Application Security Testing tool for iOS and Android applications☆36May 12, 2025Updated 9 months ago
- Bringing Mandatory Access Control to Android apps☆11Dec 20, 2021Updated 4 years ago
- Port Knocking Sequence Discovery Scanner☆17Oct 19, 2016Updated 9 years ago
- HackerRank's Solutions☆10Apr 2, 2020Updated 5 years ago
- Common Proprietary Qualcomm Binaries☆10Dec 26, 2016Updated 9 years ago
- Starter Projects for the Docker Course☆11Dec 25, 2025Updated 2 months ago
- Some notes written during my OSCP Journey (KeepNote project)☆10Mar 2, 2020Updated 6 years ago
- Resolve and quickly portscan a list of (sub)domains.☆88Jul 4, 2016Updated 9 years ago
- Knowledge base for reverse engineering and malware analysis☆15Jan 11, 2026Updated last month
- Mobile Security - OMTG-Android Walkthrough☆11Oct 31, 2019Updated 6 years ago
- ☆20Jan 12, 2022Updated 4 years ago
- Chef library cookbook for managing AWS Security Groups☆11Sep 7, 2016Updated 9 years ago
- Building CricketPrediction model using Machine Learning☆14Oct 17, 2023Updated 2 years ago
- ☆12Mar 31, 2021Updated 4 years ago
- Android application for checking security level of DRM and HDCP☆11Jan 23, 2023Updated 3 years ago
- This Log4j RCE exploit originated from https://github.com/tangxiaofeng7/CVE-2021-44228-Apache-Log4j-Rce☆10Dec 16, 2021Updated 4 years ago
- USB connection trigger.☆11Jul 5, 2022Updated 3 years ago
- Publishing advisories for CVEs found by POST Cyberforce☆13Jan 7, 2025Updated last year
- An API for naughty websites☆12Sep 18, 2022Updated 3 years ago
- Training and certifications related to secure software development☆11Feb 9, 2026Updated 3 weeks ago
- Nethunter Kernel for Samsung S23 Ultra (dm3q)☆11Nov 4, 2023Updated 2 years ago
- A BLoC pattern sample that shares logic between a mobile and a web app.☆13Oct 22, 2018Updated 7 years ago
- ☆11Jan 24, 2023Updated 3 years ago
- Simple script for testing CVE-2016-2402 and similar flaws☆13Mar 30, 2016Updated 9 years ago
- Odin4 downloader for linux☆12Sep 17, 2024Updated last year
- It contain google dork to find the wsdl file.☆13May 27, 2020Updated 5 years ago
- Tools and Scripts used in CRTP☆12Apr 27, 2020Updated 5 years ago
- ☆10May 6, 2017Updated 8 years ago
- AWS container security survey 2020☆11Dec 2, 2020Updated 5 years ago
- all about android reverse engineering☆12Oct 3, 2020Updated 5 years ago
- Something To Do Android Application Security Research☆10May 14, 2021Updated 4 years ago
- This repository contains fully disclosed accepted reports for the null Ahmedabad's Bug Bounty CTF.☆10Oct 31, 2023Updated 2 years ago
- A CLI that utilizes Okta IdP via SAML to acquire temporary AWS credentials☆10Jun 30, 2021Updated 4 years ago
- Here you will find information and examples about the most known vulnerabilities in the Bug Bounty world! [ EN ESPAÑOL ]☆14Oct 23, 2021Updated 4 years ago
- List of resources about CyberSecurity such as CTF, DFIR, Offsec, etc☆11Dec 29, 2025Updated 2 months ago