Cyber security

Awesome-Mobile-CTF : The Ultimate Guide To Mobile Capture The Flag Challenges And Resources

This is a curated list of mobile based CTFs, write-ups and vulnerable mobile apps. Most of them are android based due to the popularity of the platform.

Inspired by android-security-awesomeosx-and-ios-security-awesome and all the other awesome security lists on @github.

Mobile CTF Challenges

  • Google CTF 2021
  • Google CTF 2020 writeup 1, writeup 2
  • HacktivityCon CTF Mobile 2020
  • Trend Micro CTF 2020
  • KGB Messenger
  • ASIS CTF — ShareL Walkthrough
  • Android reversing challenges
  • Android app for IOT CTF
  • CyberTruck Challenge 2019 (Detroit USA)
  • Matryoshka-style Android reversing challenge
  • Cybertruckchallenge19
  • You Shall Not Pass – BSides Canberra 2019
  • Mobile challenges collection
  • BSidesSF 2018 CTF
  • h1-702-2018-ctf-wu
  • THC CTF 2018 – Reverse – Android serial
  • Android crack me challenges
  • OWASP crack me
  • Rednaga Challenges
  • iOS CTF
  • Android Hacking Event 2017: AES-Decrypt
  • Android Hacking Event 2017: Token-Generator
  • Android Hacking Event 2017: Flag-Validator
  • Android Hacking Event 2017: You Can Hide – But You Cannot Run
  • Android Hacking Event 2017: Why Should I Pay?
  • Android Hacking Event 2017: Esoteric
  • Android Hacking Event 2016: StrangeCalculator
  • Android Hacking Event 2016: ReverseMe
  • Android Hacking Event 2016: ABunchOfNative

For more information click here.

Varshini

Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.

Recent Posts

How to Prevent Software Supply Chain Attacks

What is a Software Supply Chain Attack? A software supply chain attack occurs when a…

2 weeks ago

How UDP Works and Why It Is So Fast

When people ask how UDP works, the simplest answer is this: UDP sends data quickly…

4 weeks ago

How EDR Killers Bypass Security Tools

Endpoint Detection and Response (EDR) solutions have become a cornerstone of modern cybersecurity, designed to…

4 weeks ago

AI-Generated Malware Campaign Scales Threats Through Vibe Coding Techniques

A large-scale malware campaign leveraging AI-assisted development techniques has been uncovered, revealing how attackers are…

4 weeks ago

How Does a Firewall Work Step by Step

How Does a Firewall Work Step by Step? What Is a Firewall and How Does…

4 weeks ago

Fake VPN Download Trap Can Steal Your Work Login in Minutes

People trying to securely connect to work are being tricked into doing the exact opposite.…

1 month ago