iamsarvagyaa / AndroidSecNotes
An actively maintained, Self curated notes related to android application security for security professionals, bugbounty hunters, pentesters, reverse engineer, and redteamers.
☆208Updated 3 years ago
Alternatives and similar repositories for AndroidSecNotes:
Users that are interested in AndroidSecNotes are comparing it to the libraries listed below
- An Intentionally designed Vulnerable Android Application built in Kotlin.☆235Updated 2 years ago
- An Intentionally designed Vulnerable Android Application built in Kotlin.☆147Updated 9 months ago
- ☆395Updated 3 years ago
- Intentionally vulnerable Android application.☆232Updated 10 months ago
- ☆139Updated 4 years ago
- This repository is a suplimentary material for Android Training's done by Anant Shrivastava from 2012-2017☆221Updated 4 years ago
- Hands-on content for Humla/Puliya sessions at null community☆88Updated 3 years ago
- A Collection of Android Pentest Learning Materials☆389Updated 4 years ago
- Vuldroid is a Vulnerable Android Application made with security issues in order to demonstrate how they can occur in code☆64Updated 3 years ago
- The Mobile App Pentest cheat sheet was created to provide concise collection of high value information on specific mobile application pen…☆71Updated 4 years ago
- A vulnerable Android application that shows simple examples of vulnerabilities in a ctf style.☆684Updated 3 years ago
- Oversecured Vulnerable Android App☆674Updated 6 months ago
- Repository for download all version of @hpAndro1337 (Android AppSec) application.☆98Updated last year
- The scripts helps security analsts to identify misconfigured firebase instances.☆207Updated 2 years ago
- The Android Penetration Testing Steps repository is intended for security professionals, penetration testers, developers, and anyone who …☆112Updated last year
- Beetlebug is an open source insecure Android application with CTF challenges built for Android Penetration Testers and Bug Bounty hunters…☆99Updated last year
- A tool to automate the boring process of APK recon☆344Updated 2 years ago
- Print out URL schemas from an Android app☆117Updated this week
- A collection of Semgrep rules derived from the OWASP MASTG specifically for Android applications.☆267Updated 6 months ago
- Bug Bounty stuffs, payloads, scripts, profiles, tips and tricks, ...☆145Updated 4 years ago
- ☆97Updated 2 years ago
- All Things Bug Bounty☆113Updated 2 years ago
- Mobile penetration testing android & iOS command cheatsheet☆357Updated 2 months ago
- Intentionally vulnerable webview implementions in Android☆56Updated 2 years ago
- A simple Python Exploit to Write Data to Insecure/vulnerable firebase databases! Commonly found inside Mobile Apps. If the owner of the a…☆298Updated 8 months ago
- Covers Top 10 OWASP Mobile Vulnerabilities☆116Updated 8 months ago
- Useful "Match and Replace" burpsuite rules☆342Updated last year
- You can find hardcoded Api-Key,Secret,Token Etc..☆80Updated 2 years ago
- A list of edge cases that occur in bug bounty programs, conversations on how they should be handled. The goal is to standardise the way t…☆229Updated 3 years ago
- ☆101Updated 4 years ago