ovaa
Security demo
An Android app demonstrating various security vulnerabilities and showcasing potential attack vectors
Oversecured Vulnerable Android App
662 stars
6 watching
178 forks
Language: Java
last commit: 8 months ago
Linked from 4 awesome lists
android-securityappsecmobile-securityvulnerable-android-appsvulnerable-application
Related projects:
Repository | Description | Stars |
---|---|---|
| A sample Android app showcasing various security techniques to protect against common threats and vulnerabilities. | 139 |
| A test application to demonstrate common security vulnerabilities in an Android app | 19 |
| An Android application showcasing various security vulnerabilities to demonstrate potential attack vectors | 62 |
| An intentionally vulnerable Android application used to demonstrate common security risks and vulnerabilities. | 106 |
| An intentionally vulnerable Android application with various exploitable security vulnerabilities. | 217 |
| An intentionally insecure Android app designed to teach developers about common vulnerabilities and insecure coding practices. | 974 |
| A vulnerable Android application designed to demonstrate various security vulnerabilities and educate developers about common Android insecurities. | 1,268 |
| An analysis of an Android app vulnerable to oracle-based attacks | 42 |
| An Android app designed to demonstrate common web application vulnerabilities and provide training in secure coding practices. | 10 |
| An intentionally vulnerable Android application designed to test security hacking skills | 656 |
| A deliberately insecure PHP application showcasing common web security vulnerabilities. | 7 |
| An insecure cloud-native microservices demo application showcasing various vulnerabilities and exploitation techniques | 48 |
| An Android vulnerability scanner to help users identify potential security issues in their devices. | 1,020 |
| A registry of known vulnerable web applications | 872 |
| An intentionally vulnerable serverless application for testing security skills and understanding secure development practices. | 534 |