optiv / InsecureShop
An Intentionally designed Vulnerable Android Application built in Kotlin.
☆241Updated 3 years ago
Alternatives and similar repositories for InsecureShop:
Users that are interested in InsecureShop are comparing it to the libraries listed below
- An actively maintained, Self curated notes related to android application security for security professionals, bugbounty hunters, pentes…☆212Updated 3 years ago
- ☆402Updated 3 years ago
- An Intentionally designed Vulnerable Android Application built in Kotlin.☆156Updated 11 months ago
- A tool to automate the boring process of APK recon☆345Updated 2 years ago
- This repository is a suplimentary material for Android Training's done by Anant Shrivastava from 2012-2017☆221Updated 4 years ago
- A collection of Semgrep rules derived from the OWASP MASTG specifically for Android applications.☆272Updated 7 months ago
- Print out URL schemas from an Android app☆118Updated last month
- The scripts helps security analsts to identify misconfigured firebase instances.☆209Updated 2 years ago
- Intentionally vulnerable Android application.☆241Updated this week
- ☆140Updated 4 years ago
- Hands-on content for Humla/Puliya sessions at null community☆90Updated 3 years ago
- Vuldroid is a Vulnerable Android Application made with security issues in order to demonstrate how they can occur in code☆64Updated 3 years ago
- A curated list of awesome browser security learning material.☆140Updated 2 years ago
- The tool is used to analyze the content of the android application in local storage.☆160Updated last year
- A vulnerable Android application that shows simple examples of vulnerabilities in a ctf style.☆693Updated 3 years ago
- Beetlebug is an open source insecure Android application with CTF challenges built for Android Penetration Testers and Bug Bounty hunters…☆104Updated last year
- Awesome information for WebSockets security research☆261Updated 3 years ago
- Oversecured Vulnerable Android App☆683Updated 8 months ago
- ☆150Updated last year
- ☆184Updated 4 months ago
- vulnerable OAuth 2.0 applications: understand the security implications of your OAuth 2.0 decisions.☆310Updated 11 months ago
- Unofficial documentation for the great tool Param Miner☆178Updated 2 years ago
- A Collection of Android Pentest Learning Materials☆390Updated 4 years ago
- A simple Python Exploit to Write Data to Insecure/vulnerable firebase databases! Commonly found inside Mobile Apps. If the owner of the a…☆300Updated 9 months ago
- 🐙 Cross-document messaging security research tool powered by https://enso.security☆287Updated last year
- A list of edge cases that occur in bug bounty programs, conversations on how they should be handled. The goal is to standardise the way t…☆229Updated 3 years ago
- xss development frameworks, with the goal of making payload writing easier.☆139Updated 7 months ago
- Workshop given at Hack in Paris 2019☆121Updated last year
- PP-finder Help you find gadget for prototype pollution exploitation☆152Updated 7 months ago
- You can find hardcoded Api-Key,Secret,Token Etc..☆79Updated 2 years ago