optiv / InsecureShopLinks
An Intentionally designed Vulnerable Android Application built in Kotlin.
☆244Updated 3 years ago
Alternatives and similar repositories for InsecureShop
Users that are interested in InsecureShop are comparing it to the libraries listed below
Sorting:
- An actively maintained, Self curated notes related to android application security for security professionals, bugbounty hunters, pentes…☆217Updated 3 years ago
- ☆409Updated 4 years ago
- This repository is a suplimentary material for Android Training's done by Anant Shrivastava from 2012-2017☆222Updated 4 years ago
- Print out URL schemas from an Android app☆121Updated 3 months ago
- The scripts helps security analsts to identify misconfigured firebase instances.☆215Updated 2 years ago
- A collection of Semgrep rules derived from the OWASP MASTG specifically for Android applications.☆284Updated 10 months ago
- Hands-on content for Humla/Puliya sessions at null community☆91Updated 3 years ago
- An Intentionally designed Vulnerable Android Application built in Kotlin.☆160Updated last year
- A tool to automate the boring process of APK recon☆347Updated 2 years ago
- ☆141Updated 5 years ago
- Intentionally vulnerable Android application.☆251Updated 2 months ago
- Awesome information for WebSockets security research☆271Updated 3 years ago
- Vuldroid is a Vulnerable Android Application made with security issues in order to demonstrate how they can occur in code☆64Updated 3 years ago
- The tool is used to analyze the content of the android application in local storage.☆162Updated 2 months ago
- Covers Top 10 OWASP Mobile Vulnerabilities☆120Updated last year
- A vulnerable Android application that shows simple examples of vulnerabilities in a ctf style.☆703Updated 3 years ago
- A Collection of Android Pentest Learning Materials☆397Updated 4 years ago
- Beetlebug is an open source insecure Android application with CTF challenges built for Android Penetration Testers and Bug Bounty hunters…☆106Updated last year
- vulnerable OAuth 2.0 applications: understand the security implications of your OAuth 2.0 decisions.☆316Updated last year
- AndroGoat☆243Updated 3 years ago
- A curated list of awesome browser security learning material.☆141Updated 2 years ago
- A list of edge cases that occur in bug bounty programs, conversations on how they should be handled. The goal is to standardise the way t…☆231Updated 3 years ago
- A tool for exploring Firebase datastores.☆224Updated last month
- Unofficial documentation for the great tool Param Miner☆178Updated 2 years ago
- Oversecured Vulnerable Android App☆695Updated 10 months ago
- A natural evolution of Burp Suite's Repeater tool☆199Updated last year
- ☆152Updated last year
- This repository explain how to write frida hook scripts and analysis written hooks.☆83Updated last year
- qsfuzz (Query String Fuzz) allows you to build your own rules to fuzz query strings and easily identify vulnerabilities.☆301Updated 2 years ago
- A Burp extension adding a passive scan check to flag parameters whose name or value may indicate a possible insertion point for SSRF or L…☆132Updated 4 years ago