A curated collection of Android exploits, hacking tools, and resources for security research and penetration testing.
Android-Exploits is a GitHub repository that aggregates Android-specific exploits, hacking tools, and security research materials. It provides categorized exploits (DoS, local, remote, webapp) alongside guides and tool recommendations for studying Android vulnerability exploitation. The project addresses the need for centralized, accessible resources in mobile security research and penetration testing.
Security researchers, penetration testers, and ethical hackers focused on Android platforms, as well as cybersecurity students and professionals looking to understand Android exploitation techniques.
Developers choose Android-Exploits for its organized, curated collection of real-world exploits and complementary tools, saving time in security research. Its integration with tools like ExploitPack and references to OWASP standards provide practical, educational value for hands-on learning.
A collection of android Exploits and Hacks
Organizes exploits into DoS, local, remote, and webapp directories, providing a structured approach to studying specific vulnerability types as shown in the directory listing.
Recommends tools like ExploitPack with explicit commands for setup and usage, facilitating hands-on experimentation without extensive tool hunting.
Includes OWASP Top 10 Mobile Risks and links to authoritative books and articles, supporting theoretical learning alongside practical exploitation.
Lists Android pentesting apps such as AndroRat and DroidBox, saving time in discovering tools for various attack vectors from the repository's catalog.
No indication of update frequency or exploit viability, risking the use of obsolete methods against modern Android versions, as the README lacks timestamps or version info.
Sparse documentation with little detail on ethical use, safe testing environments, or step-by-step instructions, assuming advanced expertise that could lead to misuse.
Absence of issue tracking, forums, or active maintenance limits reliability for ongoing security research, relying solely on static GitHub repository content.
An interactive TLS-capable intercepting HTTP proxy for penetration testers and software developers.
Documentation:
Bluetooth experimentation framework for Broadcom and Cypress chips.
Open-Awesome is built by the community, for the community. Submit a project, suggest an awesome list, or help improve the catalog on GitHub.