optiv / InsecureShop
An Intentionally designed Vulnerable Android Application built in Kotlin.
☆232Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for InsecureShop
- An actively maintained, Self curated notes related to android application security for security professionals, bugbounty hunters, pentes…☆205Updated 3 years ago
- A collection of Semgrep rules derived from the OWASP MASTG specifically for Android applications.☆247Updated 3 months ago
- ☆393Updated 3 years ago
- An Intentionally designed Vulnerable Android Application built in Kotlin.☆145Updated 7 months ago
- Print out URL schemas from an Android app☆113Updated 2 months ago
- The scripts helps security analsts to identify misconfigured firebase instances.☆204Updated 2 years ago
- This repository is a suplimentary material for Android Training's done by Anant Shrivastava from 2012-2017☆221Updated 3 years ago
- A tool to automate the boring process of APK recon☆341Updated 2 years ago
- Intentionally vulnerable Android application.☆213Updated 7 months ago
- Hands-on content for Humla/Puliya sessions at null community☆86Updated 3 years ago
- AndroGoat☆213Updated 2 years ago
- Vuldroid is a Vulnerable Android Application made with security issues in order to demonstrate how they can occur in code☆63Updated 3 years ago
- Beetlebug is an open source insecure Android application with CTF challenges built for Android Penetration Testers and Bug Bounty hunters…☆94Updated last year
- ☆136Updated 4 years ago
- A Collection of Android Pentest Learning Materials☆383Updated 4 years ago
- The tool is used to analyze the content of the android application in local storage.☆154Updated 10 months ago
- A vulnerable Android application that shows simple examples of vulnerabilities in a ctf style.☆664Updated 3 years ago
- Unofficial documentation for the great tool Param Miner☆173Updated 2 years ago
- A simple Python Exploit to Write Data to Insecure/vulnerable firebase databases! Commonly found inside Mobile Apps. If the owner of the a…☆292Updated 5 months ago
- Oversecured Vulnerable Android App☆656Updated 4 months ago
- A list of edge cases that occur in bug bounty programs, conversations on how they should be handled. The goal is to standardise the way t…☆227Updated 2 years ago
- ☆175Updated 2 weeks ago
- A curated list of awesome browser security learning material.☆130Updated 2 years ago
- All Things Bug Bounty☆111Updated 2 years ago
- vulnerable OAuth 2.0 applications: understand the security implications of your OAuth 2.0 decisions.☆307Updated 7 months ago
- A tool for exploring Firebase datastores.☆205Updated 2 years ago
- xss development frameworks, with the goal of making payload writing easier.☆136Updated 3 months ago
- Awesome information for WebSockets security research☆252Updated 2 years ago
- You can find hardcoded Api-Key,Secret,Token Etc..☆78Updated 2 years ago
- Covers Top 10 OWASP Mobile Vulnerabilities☆114Updated 6 months ago