saeidshirazi / awesome-android-security
A curated list of Android Security materials and resources For Pentesters and Bug Hunters
☆1,618Updated 2 months ago
Related projects: ⓘ
- Basics on commands/tools/info on how to assess the security of mobile applications☆1,472Updated 9 months ago
- A big list of Android Hackerone disclosed reports and other resources.☆1,422Updated last month
- An effort to build a single place for all useful android and iOS security related stuff. All references and tools belong to their respect…☆2,942Updated 6 months ago
- Runtime Mobile Security (RMS) 📱🔥 - is a powerful web interface that helps you to manipulate Android and iOS Apps at Runtime☆2,574Updated this week
- RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.☆1,719Updated 3 months ago
- Android security guides, roadmap, docs, courses, write-ups, and teryaagh.☆583Updated 10 months ago
- Bug Bounty Roadmaps☆1,638Updated 3 years ago
- A collection of awesome one-liner scripts especially for bug bounty tips.☆2,628Updated last month
- Offensive Software Exploitation Course☆2,315Updated last year
- A vulnerable Android application that shows simple examples of vulnerabilities in a ctf style.☆653Updated 3 years ago
- Keyhacks is a repository which shows quick ways in which API keys leaked by a bug bounty program can be checked to see if they're valid.☆4,850Updated last month
- This cheatsheet is built for the Bug Bounty Hunters and penetration testers in order to help them hunt the vulnerabilities from P4 to P1 …☆2,192Updated last year
- The Mobile App Pentest cheat sheet was created to provide concise collection of high value information on specific mobile application pen…☆4,542Updated 7 months ago
- Penetration tests guide based on OWASP including test cases, resources and examples.☆2,427Updated 2 years ago
- Oversecured Vulnerable Android App☆635Updated 2 months ago
- A curated list of bugbounty writeups (Bug type wise) , inspired from https://github.com/ngalongc/bug-bounty-reference☆4,640Updated last year
- Collection of methodology and test case for various web vulnerabilities.☆6,048Updated last month
- Mind-Maps of Several Things☆2,427Updated last year
- For basic researches, top 25 vulnerability parameters that can be used in automation tools or manual recon. 🛡️⚔️🧙☆1,680Updated 3 months ago
- ⚔️ Web Hacker's Weapons / A collection of cool tools used by Web hackers. Happy hacking , Happy bug-hunting☆3,812Updated 3 weeks ago
- This is a curated list of mobile based CTFs, write-ups and vulnerable apps. Most of them are android based due to the popularity of the p…☆999Updated 2 years ago
- A list of interesting payloads, tips and tricks for bug bounty hunters.☆5,775Updated last year
- All about bug bounty (bypasses, payloads, and etc)☆5,745Updated last year
- Ressources for bug bounty hunting☆1,703Updated last year
- This cheasheet is aimed at the CTF Players and Beginners to help them understand the fundamentals of Privilege Escalation with examples.☆3,255Updated last year
- Scanning APK file for URIs, endpoints & secrets.☆4,856Updated 4 months ago
- A Collection of Notes, Checklists, Writeups on Bug Bounty Hunting and Web Application Security.☆1,795Updated 3 years ago
- Binary instrumentation framework based on FRIDA☆1,535Updated 2 weeks ago
- Tools & Interesting Things for RedTeam Ops☆2,129Updated last year
- This cheasheet is aimed at the CTF Players and Beginners to help them sort Hack The Box Labs on the basis of Operating System and Difficu…☆1,512Updated last year