A curated collection of disclosed Android security reports from HackerOne and educational resources for vulnerability research.
Android-Reports-and-Resources is a curated repository of disclosed Android security vulnerability reports from HackerOne and a collection of educational resources for mobile security research. It organizes real-world bug bounty findings by category and provides links to practice apps, tools, and tutorials to help researchers learn Android security testing techniques.
Bug bounty hunters, mobile security researchers, penetration testers, and Android developers focused on application security who want to study real vulnerabilities and improve their testing skills.
It offers a centralized, categorized collection of actual disclosed vulnerabilities, saving researchers time from scouring multiple sources, and pairs them with hands-on practice applications and authoritative educational content for effective learning.
A big list of Android Hackerone disclosed reports and other resources.
Open-Awesome is built by the community, for the community. Submit a project, suggest an awesome list, or help improve the catalog on GitHub.
Organizes disclosed HackerOne reports by categories like WebView and RCE, providing concrete examples of flaws found in production apps, as seen in the README's detailed sections with links such as https://hackerone.com/reports/351555 for hardcoded credentials.
Includes links to intentionally vulnerable apps like OVAA and InjuredAndroid from the Practice Apps list, enabling hands-on exploitation practice directly referenced for skill development.
Aggregates in-depth blog posts from sources like Oversecured, offering detailed explanations of vulnerabilities such as CVE-2020-8913, as listed under the RCE/ACE category with analysis links.
Curates resources like OWASP testing guides and Android reversing tutorials from the Tools and Resources sections, saving researchers time by centralizing essential references in one place.
The repository is not automatically updated; new vulnerabilities or resources must be manually added by the maintainer, risking obsolescence and requiring users to cross-check for recent disclosures independently.
Primarily serves as a link aggregator without providing curated analysis or summarized insights from the curator, limiting its value beyond being a bookmark collection and forcing reliance on external sites.
Resources are listed categorically but not organized into a beginner-to-advanced path, making it challenging for newcomers to navigate effectively without prior knowledge of Android security concepts.