Cyber security

Awesome-Mobile-CTF : The Ultimate Guide To Mobile Capture The Flag Challenges And Resources

This is a curated list of mobile based CTFs, write-ups and vulnerable mobile apps. Most of them are android based due to the popularity of the platform.

Inspired by android-security-awesomeosx-and-ios-security-awesome and all the other awesome security lists on @github.

Mobile CTF Challenges

  • Google CTF 2021
  • Google CTF 2020 writeup 1, writeup 2
  • HacktivityCon CTF Mobile 2020
  • Trend Micro CTF 2020
  • KGB Messenger
  • ASIS CTF — ShareL Walkthrough
  • Android reversing challenges
  • Android app for IOT CTF
  • CyberTruck Challenge 2019 (Detroit USA)
  • Matryoshka-style Android reversing challenge
  • Cybertruckchallenge19
  • You Shall Not Pass – BSides Canberra 2019
  • Mobile challenges collection
  • BSidesSF 2018 CTF
  • h1-702-2018-ctf-wu
  • THC CTF 2018 – Reverse – Android serial
  • Android crack me challenges
  • OWASP crack me
  • Rednaga Challenges
  • iOS CTF
  • Android Hacking Event 2017: AES-Decrypt
  • Android Hacking Event 2017: Token-Generator
  • Android Hacking Event 2017: Flag-Validator
  • Android Hacking Event 2017: You Can Hide – But You Cannot Run
  • Android Hacking Event 2017: Why Should I Pay?
  • Android Hacking Event 2017: Esoteric
  • Android Hacking Event 2016: StrangeCalculator
  • Android Hacking Event 2016: ReverseMe
  • Android Hacking Event 2016: ABunchOfNative

For more information click here.

Varshini

Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.

Recent Posts

Pystinger : Bypass Firewall For Traffic Forwarding Using Webshell

Pystinger is a Python-based tool that enables SOCKS4 proxying and port mapping through webshells. It…

1 week ago

CVE-Search : A Tool To Perform Local Searches For Known Vulnerabilities

Introduction When it comes to cybersecurity, speed and privacy are critical. Public vulnerability databases like…

1 week ago

CVE-Search : A Tool To Perform Local Searches For Known Vulnerabilities

Introduction When it comes to cybersecurity, speed and privacy are critical. Public vulnerability databases like…

1 week ago

How to Bash Append to File: A Simple Guide for Beginners

If you are working with Linux or writing bash scripts, one of the most common…

1 week ago

Mastering the Bash Case Statement with Simple Examples

What is a bash case statement? A bash case statement is a way to control…

1 week ago

How to Check if a File Exists in Bash – Simply Explained

Why Do We Check Files in Bash? When writing a Bash script, you often work…

2 weeks ago