Covers Top 10 OWASP Mobile Vulnerabilities
☆123May 23, 2024Updated last year
Alternatives and similar repositories for Android-Vulnerabilities
Users that are interested in Android-Vulnerabilities are comparing it to the libraries listed below
Sorting:
- Python/Bash automation customization script designed to automate the reconnaissance process☆21Jan 28, 2024Updated 2 years ago
- DIVA Android - Damn Insecure and vulnerable App for Android☆1,089May 19, 2023Updated 2 years ago
- CTF Writeups☆12Feb 25, 2023Updated 3 years ago
- Subdomains-enumeration, subdomain-takeover monitoring api and S3 bucket scanner.☆40Nov 21, 2025Updated 4 months ago
- Android App Security Checklist☆889Aug 27, 2022Updated 3 years ago
- Erised Reverse Engineering and Exploitation Training Sessions☆37Feb 12, 2016Updated 10 years ago
- Vulnerable Android application for developers and security enthusiasts to learn about Android insecurities☆1,418Apr 17, 2024Updated last year
- Serpico-NG https://github.com/LUTECH-TMS-CERT/EHAT-NG☆10Dec 6, 2017Updated 8 years ago
- A vulnerable Android application that shows simple examples of vulnerabilities in a ctf style.☆744Jun 25, 2021Updated 4 years ago
- A Collection of Android Pentest Learning Materials☆409Sep 28, 2020Updated 5 years ago
- ☆11Aug 25, 2018Updated 7 years ago
- Mobile penetration testing android & iOS command cheatsheet☆384Jan 29, 2026Updated last month
- CDDC Exploitation Framework☆13Jul 3, 2023Updated 2 years ago
- TapJacking Attacks Demo☆20Apr 25, 2021Updated 4 years ago
- POC for CVE-2024-36401. This POC will attempt to establish a reverse shell from the vlun targets.☆35Jul 4, 2024Updated last year
- ☆11May 18, 2018Updated 7 years ago
- iOS iBugBazaar: Your mobile appsec playground to Explore, Exploit, Excel☆21Apr 30, 2024Updated last year
- Vuldroid is a Vulnerable Android Application made with security issues in order to demonstrate how they can occur in code☆66Sep 18, 2021Updated 4 years ago
- Some setup scripts for security research tools.☆11May 10, 2015Updated 10 years ago
- Flipper Zero application to analyse student ID cards from the University of Duisburg-Essen☆19Jan 27, 2026Updated last month
- Collection of misc IT Security related whitepapers, presentations, slides - hacking, bug bounty, web application security, XSS, CSRF, SQL…☆62May 4, 2017Updated 8 years ago
- Hidden parameters discovery suite☆224Nov 14, 2022Updated 3 years ago
- Capture-The-Flag(CTF) toolkit☆11Jan 8, 2015Updated 11 years ago
- Learning source code review, spot vulnerability, find some ways how to fix it.☆30Nov 17, 2022Updated 3 years ago
- A big list of Android Hackerone disclosed reports and other resources.☆1,672Sep 10, 2025Updated 6 months ago
- Just lists of lists of lists !☆17Oct 13, 2025Updated 5 months ago
- This are some Dorks and Platform to find the Bug Bounty Programs.☆82Apr 11, 2025Updated 11 months ago
- ☆38Nov 27, 2020Updated 5 years ago
- ☆16Oct 24, 2018Updated 7 years ago
- Dumping CTF related code here☆17May 3, 2017Updated 8 years ago
- XSSearch is a comprehensive reflected XSS tool built on selenium framework in python language. It contains more than 3000 payloads for au…☆59Feb 4, 2022Updated 4 years ago
- The dexdump tool☆17Dec 27, 2013Updated 12 years ago
- This is where I share code/material shown in my videos☆76Jun 17, 2023Updated 2 years ago
- Radamsa fuzzer extension for Burp Suite☆23Jun 25, 2013Updated 12 years ago
- Where's My Browser? Learn hacking WebViews (Android Mobile App)☆44Jul 31, 2018Updated 7 years ago
- bug bounty☆11Aug 13, 2023Updated 2 years ago
- A Simple command line tool that helps checking web applications to identify insecure deserialization vulnerabilities.☆24Jul 10, 2019Updated 6 years ago
- Damn Vulnerable Thick Client App☆155Jul 16, 2020Updated 5 years ago
- Simple Karma Attack☆68Oct 1, 2020Updated 5 years ago