InjuredAndroid - A vulnerable Android application that shows simple examples of vulnerabilities in a CTF style


InjuredAndroid - A vulnerable Android application with CTF examples based on bug bounty findings, exploitation concepts, and pure creativity. Setup for a physical device Download the latest debug or release injuredandroid.apk from the releases. Enable USB debugging on your Android test phone. Connect your phone and your pc with a usb cable. Install via adb. adb install InjuredAndroid.apk. Note: You need to use the absolute path to the .apk file or be in the same directory. Setup for an Android Emulator using Android Studio Download the apk file. Start the emulator from Android Studio (I recommend downloading an emulator with Google APIs so root adb can be enabled). Drag and drop the .apk file on the emulator and InjuredAndroid.apk will install. Build from source Build steps in progress. The flutter module makes this slightly more complicated. Tips and CTF Overview Decompiling the Android app is highly recommended. XSSTEST is just for....

July 17, 2020
Notify of
Inline Feedbacks
View all comments
© HAKIN9 MEDIA SP. Z O.O. SP. K. 2023
What certifications or qualifications do you hold?
Max. file size: 150 MB.
What level of experience should the ideal candidate have?
What certifications or qualifications are preferred?

Download Free eBook

Step 1 of 4


We’re committed to your privacy. Hakin9 uses the information you provide to us to contact you about our relevant content, products, and services. You may unsubscribe from these communications at any time. For more information, check out our Privacy Policy.