OVAA (Oversecured Vulnerable Android App) is an intentionally vulnerable Android application designed for security testing and educational purposes. The app aggregates known and popular Android platform security vulnerabilities to provide a controlled environment for learning and testing. The application contains multiple security vulnerabilities including: - Deeplink exploitation that allows installation of arbitrary login URLs, potentially leading to credential theft when users authenticate - Content provider access vulnerabilities through deeplinks that can grant unauthorized access to non-exported content providers with URI permissions - Host validation bypass issues in deeplink processing that can be exploited to access malicious content - WebView vulnerabilities that allow opening arbitrary URLs and potentially accessing local files through misconfigured WebView settings The app serves as a practical learning tool for security researchers, penetration testers, and developers to understand common Android security flaws and test detection capabilities in a safe environment.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
Grafeas is an API specification for managing and auditing metadata about software resources across the software supply chain.
A plugin for viewing, detecting weak configurations, and generating Content Security Policy headers.
A deliberately vulnerable Java web application designed for educational purposes to teach web application security concepts and common vulnerabilities.
A PHP port of Rack::Honeypot, a spam trap that detects and blocks spambots
Bearer CLI is a static application security testing tool that scans source code across multiple programming languages to identify and prioritize OWASP Top 10 and CWE Top 25 security vulnerabilities through data flow analysis.
QIRA is a competitor to strace and gdb with MIT license, supporting Ubuntu and Docker for wider compatibility.
RiskInDroid is a machine learning-based tool that performs quantitative risk analysis of Android applications by reverse engineering bytecode and analyzing permission usage to generate numeric risk scores.
An open-source tool that automates the detection and analysis of DLL hijacking vulnerabilities in Windows applications, providing detailed reports and remediation guidance.
SearchCode is an extensive code search engine that indexes 75 billion lines of code from millions of projects to help developers find coding examples and libraries.