An intentionally vulnerable Android Application to demonstrate various vulnerabilities that airses in Android Components.
☆45Apr 11, 2025Updated last year
Alternatives and similar repositories for Damn-Vulnerable-Android-Components
Users that are interested in Damn-Vulnerable-Android-Components are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Sample code for 3rd party developers working on Android On Snapdragon☆12Sep 4, 2024Updated last year
- This tools used for Automating finding of subdomain, and checking for alive subdomain, and gathering js files from all the subdomain and …☆22Jun 28, 2024Updated last year
- Fuzzinglabs's audits, publications, workshops and reports☆30May 9, 2025Updated last year
- ☆13Oct 24, 2024Updated last year
- Android BugBazaar: Your mobile appsec playground to Explore, Exploit, Excel☆73Aug 14, 2024Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- 🕷️MITMProxy + Ettercap = PWNd☆11Dec 5, 2018Updated 7 years ago
- Android webviews and securiy☆24Sep 18, 2025Updated 8 months ago
- A repo to store public scan data for my bug bounty hunting framework.☆23Dec 26, 2025Updated 4 months ago
- Android App Reverse Engineering & Analysis Toolkit☆17Jul 10, 2024Updated last year
- Web 3.0 Security resources☆16Oct 12, 2023Updated 2 years ago
- Monitor and Control how Android Apps access your local storage. A great tool to investigate what files your apps put their eyes on.☆11Feb 5, 2024Updated 2 years ago
- A tool for reverse engineering Android apk files☆13Nov 30, 2018Updated 7 years ago
- ☆12Mar 22, 2024Updated 2 years ago
- The book introduces the internal of AOSP☆76Updated this week
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A CLI tool to extract, analyze, and filter JavaScript links from web pages or URLs, with regex matching and structured JSON output.☆19Jan 6, 2025Updated last year
- A script to automatically generate TWRP-compatible device tree from a boot/recovery image☆11Apr 10, 2021Updated 5 years ago
- ARC4 (Alleged RC4) cryptography provider class library.☆10Dec 15, 2024Updated last year
- ☆36Mar 6, 2025Updated last year
- This code implements an Advanced Prompt Hacking Tester, which allows users to test the responses of an AI system by generating various ty…☆13Apr 14, 2024Updated 2 years ago
- Complete guide on how to install macOS using OpenCore on Asus ASUS TUF F15 FX506LHB and maybe similar FX506 models☆11Feb 10, 2023Updated 3 years ago
- Xninjaz is a powerful and versatile multi-vulnerability scanner designed to detect various web application vulnerabilities, including Loc…☆11Oct 16, 2025Updated 7 months ago
- Short writeups/solvers for interesting CTF challenges.☆16Nov 12, 2022Updated 3 years ago
- A MCP Server for APK Tool (Part of Android Reverse Engineering MCP Suites)☆411Apr 25, 2026Updated 3 weeks ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- :)☆20Oct 29, 2025Updated 6 months ago
- RedirectHunter is a powerful open redirect vulnerability scanner that helps you quickly identify and mitigate potential security risks in…☆13Apr 21, 2023Updated 3 years ago
- Save contacts that you want don't want to show on the dailer. Black Book for saving contacts in python☆11Apr 30, 2023Updated 3 years ago
- Work In Progress☆10Jul 10, 2024Updated last year
- A modern, real-time monitoring dashboard built with FastAPI and Svelte. This application demonstrates real-time data streaming using Serv…☆19Mar 31, 2025Updated last year
- kali linux tutorials and commands for ethical hackers and penetration testing☆10Jul 6, 2025Updated 10 months ago
- Script for generating write-ups templates for CTF challenges 🗃️☆15Feb 5, 2022Updated 4 years ago
- CVE-2024-6387 with auto ip scanner and auto expliot☆11Jul 4, 2024Updated last year
- "Terrible Thick Client" is a vulnerable application developed in C# .NET framework.☆20Jul 9, 2023Updated 2 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- A simple RFC 2136 dynamic DNS updater☆15Apr 25, 2026Updated 3 weeks ago
- ☆12Feb 28, 2025Updated last year
- ☆15Dec 12, 2025Updated 5 months ago
- ☆53Aug 11, 2024Updated last year
- Tools for installing Linux distros on Android easily and quickly without any hassle☆11Oct 16, 2025Updated 7 months ago
- Designed and implemented a custom CNN learning architecture for deep fake image detection using a pre-trained Xception model and achieved…☆10Feb 7, 2023Updated 3 years ago
- X-wpbf is a wordpress bruteforce tool to find admin or user passwords via the admin login of the target website☆12Oct 16, 2025Updated 7 months ago