b66l / OASAM
OASAM is the acronym of Open Android Security Assessment Methodology and its purpose is to become a reference framework on Android application vulnerability assessments.
☆85Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for OASAM
- Learning Penetration Testing of Android Applications☆77Updated 7 years ago
- Java Object Deserialization on Android☆83Updated 5 years ago
- ☆42Updated 6 years ago
- Collection of Android security related resources☆96Updated 10 months ago
- Penetration testing and auditing toolkit for Android apps.☆236Updated 4 years ago
- Python tool that generates an Xmind map with all the information gathered and any evidence of possible vulnerabilities identified via sta…☆119Updated 5 years ago
- ☆26Updated 3 years ago
- VyAPI - A cloud based vulnerable hybrid Android App☆84Updated 4 years ago
- Android security labs☆109Updated 5 years ago
- ActionScript Proof of Concept to perform cross-domain reads☆45Updated 11 years ago
- Microsoft Excel spreadsheets for consistent security evaluation of Android and iOS mobile applications☆50Updated 9 years ago
- bash script to facilitate some aspects of an Android application assessment☆155Updated 3 years ago
- [A]ndroid [A]pplication [P]entest [G]uide☆122Updated 5 years ago
- All that is required to run MobSF in the ci☆41Updated last year
- MobSF related Presentations, Slides and Others.☆31Updated 6 years ago
- Easy to use APK/IPA Mobile App Inspector☆73Updated 2 years ago
- Burp Suite plugin created for using Collaborator tool during manual testing in a comfortable way!☆103Updated 6 years ago
- Extension providing view with filtering capabilities for both complete and incomplete requests from all burp tools.☆47Updated 3 years ago
- Highlight Burp proxy requests made by different browsers☆30Updated 7 years ago
- Everything you need to exploit overly permissive crossdomain.xml files☆87Updated 9 years ago
- ZIP File Raider - Burp Extension for ZIP File Payload Testing☆70Updated 4 years ago
- Created by High-Tech Bridge, the Purposefully Insecure and Vulnerable Android Application (PIVAA) replaces outdated DIVA for benchmark of…☆106Updated 4 years ago
- ☆70Updated 6 years ago
- A CRLF ( Carriage Return Line Feed ) Injection attack occurs when a user manages to submit a CRLF into an application. This is most commo…☆46Updated 2 years ago
- Scripts to help me test Android apps☆52Updated 3 years ago
- Send notifications if a new program is published on HackerOne using Pushbullet☆25Updated 7 years ago
- Archive - Repository contains old publicly released presentations, tools, Proof of Concepts and other junk.☆26Updated last year
- Static analysis tool for Android/iOS apps focusing on security issues outside the source code☆128Updated last year
- Files for appsecwiki.com☆114Updated 4 years ago