This repository houses diverse files and challenges centered around Just Mobile Security. With practical exercises and resources aimed at enhancing your understanding and skills in mobile security. From code samples to real-world challenges, this collection is designed to empower developers and security enthusiasts to navigate and strengthen the…
☆13Apr 15, 2024Updated last year
Alternatives and similar repositories for mobile-challenges
Users that are interested in mobile-challenges are comparing it to the libraries listed below
Sorting:
- Config files for my GitHub profile.☆10Dec 16, 2025Updated 2 months ago
- A set of HTML code demonstrations☆26Sep 1, 2020Updated 5 years ago
- Notes for the PJPT exam!☆14Aug 8, 2024Updated last year
- ☆92Jul 10, 2024Updated last year
- Unicode Security Toolkit☆40Oct 7, 2024Updated last year
- Offensive recon with GitHub Actions☆11Aug 25, 2024Updated last year
- Prototype-Pollution-Lab to chain the vulnerabilities between multiple accounts.☆13Sep 11, 2021Updated 4 years ago
- rShellZ s a linux reverse-shell & exploitation assistance framework. With lots of payload and post exploitation modules.☆14Dec 13, 2023Updated 2 years ago
- 🎯 Chrome Extension - Passive scanner for Dependency Confusion vulnerabilities in npm/PyPI packages☆25Jan 31, 2026Updated last month
- A Burp Suite extension that converts IP addresses to decimal notation, useful for SSRF bypass and WAF evasion testing. Created by Harshad…☆11Dec 9, 2024Updated last year
- A C and Go /proc/pid/maps cloak of invisibilty for shared object files☆21Nov 19, 2025Updated 3 months ago
- ☆16Jan 23, 2026Updated last month
- Blind XSS SVG☆10Mar 27, 2023Updated 2 years ago
- 𝘔𝘢𝘯𝘺 𝘰𝘧 𝘵𝘩𝘦𝘴𝘦 𝘴𝘤𝘳𝘪𝘱𝘵𝘴 𝘢𝘳𝘦 𝘤𝘰𝘭𝘭𝘦𝘤𝘵𝘦𝘥 𝘧𝘳𝘰𝘮 𝘤𝘰𝘶𝘳𝘴𝘦𝘴, 𝘣𝘭𝘰𝘨𝘴, 𝘤𝘰𝘮𝘮𝘶𝘯𝘪𝘵𝘺 𝘳𝘦𝘴𝘰𝘶𝘳𝘤�…☆26Nov 30, 2025Updated 3 months ago
- Hands-on challenges for learning how to reverse engineer Flutter applications.☆39Jan 31, 2026Updated last month
- ☆11Jun 6, 2023Updated 2 years ago
- ☆12Aug 22, 2017Updated 8 years ago
- Python API for Monarch Money☆17Jan 17, 2026Updated last month
- a game based on space invaders for a mini-course on learning pygame☆17Oct 18, 2021Updated 4 years ago
- 🤖 The Modern Port Scanner 🤖☆14Nov 5, 2024Updated last year
- ☆11Aug 12, 2022Updated 3 years ago
- Truly unique, provable Certificates for Companies and Universities☆11Jun 28, 2022Updated 3 years ago
- Automated client-side template injection (sandbox escape/bypass) detection for AngularJS.☆11Dec 14, 2025Updated 2 months ago
- Android webviews and securiy☆23Sep 18, 2025Updated 5 months ago
- SAPLAR - LFI & Path Traversal Scanner☆15Mar 11, 2025Updated 11 months ago
- tl;tr; jhaddix bhmv5☆10Jul 2, 2020Updated 5 years ago
- Learning Smart Contracts with freecodecamp!☆14Jun 1, 2022Updated 3 years ago
- PDump is a project for dumping leaked credentials from DEHASHED☆17Jan 21, 2024Updated 2 years ago
- FireVu is an Intentionally vulnerable Android application developed for Android open source security.☆11Mar 13, 2024Updated last year
- Extracting unpacked dec files from running application using frida.☆44Apr 16, 2023Updated 2 years ago
- Hadoken: A versatile Active Directory pentesting tool engineered to identify vulnerabilities and streamline security assessments.☆46Oct 26, 2025Updated 4 months ago
- XXE techniques☆14Oct 10, 2021Updated 4 years ago
- A Chrome extension that automatically scans web pages and internal links for user-defined keywords, storing results and sending notificat…☆24Sep 28, 2025Updated 5 months ago
- A modified version of TomNomNom's anew, allowing for multiple files to be defined as parameters.☆13Jun 17, 2023Updated 2 years ago
- Installs ADDS and configures a vulnerable domain via a powershell script☆12Jul 13, 2023Updated 2 years ago
- 该资源为作者CTF学习Web类型题目解题思路,希望对您有所帮助~☆12Jun 13, 2020Updated 5 years ago
- ☆14Feb 13, 2026Updated 3 weeks ago
- OLD repo for my GitBook (CTF writeups / vuln research / bugbounty) - please check out cryptocat.me/blog for the updated content!☆17Dec 30, 2025Updated 2 months ago
- Forensics Science Education☆11Apr 26, 2021Updated 4 years ago