OVAA (Oversecured Vulnerable Android App) is an intentionally vulnerable Android application designed for security testing and educational purposes. The app aggregates known and popular Android platform security vulnerabilities to provide a controlled environment for learning and testing. The application contains multiple security vulnerabilities including: - Deeplink exploitation that allows installation of arbitrary login URLs, potentially leading to credential theft when users authenticate - Content provider access vulnerabilities through deeplinks that can grant unauthorized access to non-exported content providers with URI permissions - Host validation bypass issues in deeplink processing that can be exploited to access malicious content - WebView vulnerabilities that allow opening arbitrary URLs and potentially accessing local files through misconfigured WebView settings The app serves as a practical learning tool for security researchers, penetration testers, and developers to understand common Android security flaws and test detection capabilities in a safe environment.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
APKiD is a tool that identifies compilers, packers, obfuscators, and other weird stuff in APK files.
RiskInDroid is a machine learning-based tool that performs quantitative risk analysis of Android applications by reverse engineering bytecode and analyzing permission usage to generate numeric risk scores.
A technology lookup and lead generation tool that identifies the technology stack of any website and provides features for market research, competitor analysis, and data enrichment.
GuardDog is a CLI tool that identifies malicious PyPI and npm packages using heuristics-based analysis of source code and metadata.
A brute-force protection middleware for express routes that rate-limits incoming requests.
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.
SearchCode is an extensive code search engine that indexes 75 billion lines of code from millions of projects to help developers find coding examples and libraries.
Bearer CLI is a static application security testing tool that scans source code across multiple programming languages to identify and prioritize OWASP Top 10 and CWE Top 25 security vulnerabilities through data flow analysis.
PINNED

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.