💥
Android Penetration Testing
WEBSITEGITHUBLINKDININSTAGRAM
  • 🕵️‍♂️OWASP Mobile Top 10
    • OWASP Mobile Top 10 2014
    • OWASP Mobile Top 10 2016
    • OWASP Mobile Top 10 2023
      • Insecure Authentication/Authorization
      • Insecure Communication
      • Inadequate Supply Chain Security
      • Inadequate Privacy Controls
      • Insufficient Input/Output Validation
      • Security Misconfiguration
      • Insufficient Cryptography
      • Insecure Data Storage
      • Insufficient Binary Protections
  • "Let's Dive into the Theory"
  • 😍Theory of Android Penetration Testing
    • 👑Basic - Advance
    • 💥Professional - Expert
    • 🟧Types of Mobile Applications
    • 🟣Android Architecture
    • 🟦Android Show
    • 🚀Secrets of Android App Creation
    • ♦️Android's Data Treasure Chests
    • 🛑Mysterious .apk File:
    • 🏹Android Pentesting with Cutting-Edge Tools
    • ⬛Android File System
  • "Let's Dive into the Practical"
  • 😇Vulnerable Android Application with Practical.
    • 😉InsecureShop
      • 😁Vulnerability #1: Insecure Logging
      • 😂Vulnerability #2: Hardcoded Credentials
      • 😆Vulnerability #3: Insecure Data Storage
      • 🤣Vulnerability #4: Lack of SSL Certificate Validation
      • 😍Vulnerability #5: Insufficient URL Validation
      • 😄Vulnerability #6: Weak Host Validation
      • 😘Vulnerability #7: AWS Cognito Misconfiguration
      • 😃Vulnerability #8: Insecure Broadcast Receiver
      • 😛Vulnerability #9: Use of Implicit intent to send a broadcast with sensitive data
      • 😎Vulnerability #10: Using Components with Known Vulnerabilities
      • 😜Vulnerability #11: Intent Redirection (Access to Protected Components)
      • 😂Vulnerability #12: Insecure Webview Properties Enabled
      • 😆Vulnerability #13: Intercepting Implicit intent to load arbitrary URL
      • 🙃Vulnerability #14: Insecure Content Provider
      • 🥰Reading Material
  • "Let's Dive into the Interview Questions"
  • 😎Important Interview Questions for Android Application Penetration Testing.
    • 🥇Part - 1
    • 🥈Part - 2
    • 🥉Part - 3
    • 🏅Part - 4
    • 🎖️Part - 5
  • 😘Notes
    • Tools to use
    • Important Reports from Hackerone
Powered by GitBook
On this page

Vulnerable Android Application with Practical.

Unleash your curiosity and dive into a world of challenges with the Vulnerable Android Application collection! Whether you're a code enthusiast, aspiring hacker, or just fascinated by mobile security

Previous"Let's Dive into the Practical"NextInsecureShop

Last updated 1 year ago

1. Insecure Bank

2. Android Digital Bank

3. Damn Insecure and Vulnerable Application

4. Hackme Bank

5. Damn Vulnerable Hybrid Mobile Application

6. Damn Vulnerable Android Application

7. OWASP GoatDroid

8. Dodo Vulnerable Bank

9. Vulnerable Android Application

10.Urdu

11.MoshZuk

12.AppKnox Vulnerable Application

13.Vulnerable Android Application

14.Android Security Labs

https://github.com/dineshshetty/Android-InsecureBankv2
https://github.com/CyberScions/Digitalbank
https://github.com/payatu/diva-android
http://www.mcafee.com/us/downloads/free-tools/hacme-bank-android.aspx
https://github.com/logicalhacking/DVHMA
https://code.google.com/archive/p/dvaa/
https://github.com/jackMannino/OWASP-GoatDroid-Project
https://github.com/CSPF-Founder/DodoVulnerableBank
https://github.com/dan7800/VulnerableAndroidAppOracle
http://urdusecurity.blogspot.co.uk/2014/08/Exploiting-debuggable-android-apps.html
https://dl.dropboxusercontent.com/u/37776965/Work/MoshZuk.apk
https://github.com/appknox/vulnerable-application
https://github.com/Lance0312/VulnApp
https://github.com/SecurityCompass/AndroidLabs
😇
Page cover image