An Intentionally designed Vulnerable Android Application built in Kotlin.
☆255Mar 2, 2022Updated 4 years ago
Alternatives and similar repositories for InsecureShop
Users that are interested in InsecureShop are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Oversecured Vulnerable Android App☆736Jul 18, 2024Updated last year
- An Intentionally designed Vulnerable Android Application built in Kotlin.☆187Apr 19, 2024Updated last year
- ☆437Jun 1, 2021Updated 4 years ago
- A vulnerable Android application that shows simple examples of vulnerabilities in a ctf style.☆745Jun 25, 2021Updated 4 years ago
- Damn Vulnerable GraphQL Application is an intentionally vulnerable GraphQL service implementation designed for learning about and practis…☆1,676May 24, 2025Updated 10 months ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- vulnerable OAuth 2.0 applications: understand the security implications of your OAuth 2.0 decisions.☆329Mar 27, 2024Updated 2 years ago
- Created by High-Tech Bridge, the Purposefully Insecure and Vulnerable Android Application (PIVAA) replaces outdated DIVA for benchmark of…☆106May 27, 2020Updated 5 years ago
- A big list of Android Hackerone disclosed reports and other resources.☆1,676Sep 10, 2025Updated 6 months ago
- Detects request smuggling via HTTP/2 downgrades.☆94Jul 30, 2022Updated 3 years ago
- DIVA Android - Damn Insecure and vulnerable App for Android☆1,094May 19, 2023Updated 2 years ago
- A curated list of Android Security materials and resources For Pentesters and Bug Hunters☆1,886Mar 3, 2026Updated last month
- This repository houses the materials, slides and exercises from the r2con 2020 walkthrough sessions.☆38Sep 2, 2020Updated 5 years ago
- This exention enables autocompletion within BurpSuite Repeater/Intruder tabs.☆164Mar 5, 2021Updated 5 years ago
- part of my wordlist to bruteforce DNS to find subdoamains.☆61Jul 26, 2021Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Hidden parameters discovery suite☆224Nov 14, 2022Updated 3 years ago
- Damn Vulnerable Bank is designed to be an intentionally vulnerable android application. This provides an interface to assess your android…☆741Dec 13, 2023Updated 2 years ago
- Android security workshop material taught during the CyberTruck Challenge 2019 (Detroit USA).☆105Aug 17, 2021Updated 4 years ago
- Oversecured Vulnerable iOS App☆231Jan 10, 2024Updated 2 years ago
- 🔑 Authz0 is an automated authorization test tool. Unauthorized access can be identified based on URLs and Roles & Credentials.☆428Updated this week
- Intentionally vulnerable Android application.☆382Sep 20, 2025Updated 6 months ago
- Burp Suite Extension useful to verify OAUTHv2 and OpenID security☆176Oct 26, 2024Updated last year
- Mobile Edge-Dynamic Unified Security Analysis☆2,214Apr 2, 2026Updated last week
- A collection of awesome API Security tools and resources. The focus goes to open-source tools and resources that benefit all the communit…☆3,714Nov 23, 2025Updated 4 months ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- A burp-suite plugin that extract all parameter names from in-scope requests☆29Nov 9, 2021Updated 4 years ago
- Django application that performs SAST and Malware Analysis for Android APKs☆225Updated this week
- Repository for download all version of @hpAndro1337 (Android AppSec) application.☆103Dec 26, 2023Updated 2 years ago
- Fast CLI tool to find the parameters that can be used to find SSRF or Out-of-band resource load☆295Sep 22, 2024Updated last year
- Secret and/or credential patterns used for gf.☆243Feb 10, 2023Updated 3 years ago
- An actively maintained, Self curated notes related to android application security for security professionals, bugbounty hunters, pentes…☆225Aug 26, 2021Updated 4 years ago
- ☆667Oct 31, 2022Updated 3 years ago
- The Mobile App Pentest cheat sheet was created to provide concise collection of high value information on specific mobile application pen…☆5,181Feb 8, 2024Updated 2 years ago
- Web Cache Vulnerability Scanner is a Go-based CLI tool for testing for web cache poisoning. It is developed by Hackmanit GmbH (http://hac…☆1,165Jan 21, 2026Updated 2 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- oauth security guidelines☆232Jun 25, 2019Updated 6 years ago
- VyAPI - A cloud based vulnerable hybrid Android App☆86Feb 21, 2020Updated 6 years ago
- Keyhacks is a repository which shows quick ways in which API keys leaked by a bug bounty program can be checked to see if they're valid.☆6,144Aug 14, 2024Updated last year
- A list of bizarre crackmes☆147Mar 24, 2026Updated 2 weeks ago
- ☆143Apr 20, 2020Updated 5 years ago
- This challenge is Inon Shkedy's 31 days API Security Tips.☆2,234Apr 20, 2022Updated 3 years ago
- This is a curated list of mobile based CTFs, write-ups and vulnerable apps. Most of them are android based due to the popularity of the p…☆1,134Jun 26, 2022Updated 3 years ago