DVHMA (Damn Vulnerable Hybrid Mobile App) is an intentionally vulnerable Android hybrid mobile application designed for security testing and educational purposes. The application is built using Apache Cordova framework and contains deliberate security vulnerabilities that allow security professionals to test their tools and techniques in a legal environment. The primary focus is on injection vulnerabilities that exploit the JavaScript to Java bridge commonly found in hybrid mobile applications. DVHMA serves as a training platform for developers to understand common security pitfalls when developing hybrid mobile apps using frameworks like Apache Cordova or SAP Kapsel. The application includes multiple vulnerable plugins including DVHMA-Storage and DVHMA-WebIntent that demonstrate various attack vectors. The tool requires Android SDK and Apache Cordova version 8.0.0 for building and deployment. It provides a controlled environment for security researchers and developers to study hybrid app vulnerabilities without legal concerns.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
An open-source tool that automates the detection and analysis of DLL hijacking vulnerabilities in Windows applications, providing detailed reports and remediation guidance.
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.
RiskInDroid is a machine learning-based tool that performs quantitative risk analysis of Android applications by reverse engineering bytecode and analyzing permission usage to generate numeric risk scores.
A source code search engine for searching alphanumeric snippets, signatures, or keywords in web page HTML, JS, and CSS code.
A Nuxt 3 security module that automatically implements OWASP security patterns through HTTP headers, middleware, and various protection mechanisms including CSP, XSS validation, CORS, and CSRF protection.
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.
A brute-force protection middleware for express routes that rate-limits incoming requests.
QIRA is a competitor to strace and gdb with MIT license, supporting Ubuntu and Docker for wider compatibility.
A modular Python tool that obfuscates Android applications by manipulating decompiled smali code, resources, and manifest files without requiring source code access.
PINNED

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.