Skip to content
#

mobile-penetration-testing

Here are 17 public repositories matching this topic...

As a bug hunter, are your bug bounty reports getting rejected because you don't use a "malicious" Proof of Concept (PoC) app to exploit the vulnerabilities? I've got you covered!

  • Updated Oct 15, 2025
  • Java

Uncover usage of insecure functions, implementation of weak cryptography, encryption status, and the presence of security features like Position Independent Executable (PIE), Stack Canaries, and Automatic Reference Counting (ARC) in iOS Applications Binaries.

  • Updated Oct 3, 2025
  • Shell

Improve this page

Add a description, image, and links to the mobile-penetration-testing topic page so that developers can more easily learn about it.

Curate this topic

Add this topic to your repo

To associate your repository with the mobile-penetration-testing topic, visit your repo's landing page and select "manage topics."

Learn more