An Intentionally designed Vulnerable Android Application built in Kotlin.
☆255Mar 2, 2022Updated 4 years ago
Alternatives and similar repositories for InsecureShop
Users that are interested in InsecureShop are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Oversecured Vulnerable Android App☆740Jul 18, 2024Updated last year
- An Intentionally designed Vulnerable Android Application built in Kotlin.☆189Apr 19, 2024Updated 2 years ago
- ☆436Jun 1, 2021Updated 4 years ago
- A vulnerable Android application that shows simple examples of vulnerabilities in a ctf style.☆748Jun 25, 2021Updated 4 years ago
- Damn Vulnerable GraphQL Application is an intentionally vulnerable GraphQL service implementation designed for learning about and practis…☆1,678May 24, 2025Updated 11 months ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- vulnerable OAuth 2.0 applications: understand the security implications of your OAuth 2.0 decisions.☆330Mar 27, 2024Updated 2 years ago
- Created by High-Tech Bridge, the Purposefully Insecure and Vulnerable Android Application (PIVAA) replaces outdated DIVA for benchmark of…☆106May 27, 2020Updated 5 years ago
- A big list of Android Hackerone disclosed reports and other resources.☆1,682Sep 10, 2025Updated 7 months ago
- Detects request smuggling via HTTP/2 downgrades.☆94Jul 30, 2022Updated 3 years ago
- DIVA Android - Damn Insecure and vulnerable App for Android☆1,103May 19, 2023Updated 2 years ago
- A curated list of Android Security materials and resources For Pentesters and Bug Hunters☆1,894Mar 3, 2026Updated last month
- This repository houses the materials, slides and exercises from the r2con 2020 walkthrough sessions.☆38Sep 2, 2020Updated 5 years ago
- This exention enables autocompletion within BurpSuite Repeater/Intruder tabs.☆164Mar 5, 2021Updated 5 years ago
- part of my wordlist to bruteforce DNS to find subdoamains.☆61Jul 26, 2021Updated 4 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Hidden parameters discovery suite☆224Nov 14, 2022Updated 3 years ago
- Damn Vulnerable Bank is designed to be an intentionally vulnerable android application. This provides an interface to assess your android…☆751Dec 13, 2023Updated 2 years ago
- Android security workshop material taught during the CyberTruck Challenge 2019 (Detroit USA).☆105Aug 17, 2021Updated 4 years ago
- Oversecured Vulnerable iOS App☆232Jan 10, 2024Updated 2 years ago
- 🔑 Authz0 is an automated authorization test tool. Unauthorized access can be identified based on URLs and Roles & Credentials.☆427Apr 8, 2026Updated 3 weeks ago
- Intentionally vulnerable Android application.☆386Sep 20, 2025Updated 7 months ago
- Burp Suite Extension useful to verify OAUTHv2 and OpenID security☆176Oct 26, 2024Updated last year
- Mobile Edge-Dynamic Unified Security Analysis☆2,243Apr 21, 2026Updated last week
- A collection of awesome API Security tools and resources. The focus goes to open-source tools and resources that benefit all the communit…☆3,773Nov 23, 2025Updated 5 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- A burp-suite plugin that extract all parameter names from in-scope requests☆29Nov 9, 2021Updated 4 years ago
- Django application that performs SAST and Malware Analysis for Android APKs☆225Apr 21, 2026Updated last week
- Repository for download all version of @hpAndro1337 (Android AppSec) application.☆103Dec 26, 2023Updated 2 years ago
- Fast CLI tool to find the parameters that can be used to find SSRF or Out-of-band resource load☆296Sep 22, 2024Updated last year
- Secret and/or credential patterns used for gf.☆244Feb 10, 2023Updated 3 years ago
- An actively maintained, Self curated notes related to android application security for security professionals, bugbounty hunters, pentes…☆225Aug 26, 2021Updated 4 years ago
- ☆673Oct 31, 2022Updated 3 years ago
- The Mobile App Pentest cheat sheet was created to provide concise collection of high value information on specific mobile application pen…☆5,189Feb 8, 2024Updated 2 years ago
- Web Cache Vulnerability Scanner is a Go-based CLI tool for testing for web cache poisoning. It is developed by Hackmanit GmbH (http://hac…☆1,172Jan 21, 2026Updated 3 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- oauth security guidelines☆232Jun 25, 2019Updated 6 years ago
- VyAPI - A cloud based vulnerable hybrid Android App☆86Feb 21, 2020Updated 6 years ago
- Keyhacks is a repository which shows quick ways in which API keys leaked by a bug bounty program can be checked to see if they're valid.☆6,182Aug 14, 2024Updated last year
- A list of bizarre crackmes☆146Mar 24, 2026Updated last month
- ☆143Apr 20, 2020Updated 6 years ago
- This challenge is Inon Shkedy's 31 days API Security Tips.☆2,235Apr 20, 2022Updated 4 years ago
- This is a curated list of mobile based CTFs, write-ups and vulnerable apps. Most of them are android based due to the popularity of the p…☆1,140Jun 26, 2022Updated 3 years ago