mirror of
https://github.com/The-Art-of-Hacking/h4cker
synced 2024-11-22 02:43:02 +00:00
adding mobile device resources
This commit is contained in:
parent
6117636277
commit
1383ddab10
1 changed files with 37 additions and 0 deletions
37
mobile_security/README.md
Normal file
37
mobile_security/README.md
Normal file
|
@ -0,0 +1,37 @@
|
|||
# Mobile Device Security
|
||||
The following are several of the resources covered in the Wireless Networks, IoT, and Mobile Devices Hacking (The Art of Hacking Series) LiveLessons.
|
||||
|
||||
## OWASP Resources
|
||||
|
||||
### OWASP Mobile Security Project
|
||||
* https://www.owasp.org/index.php/OWASP_Mobile_Security_Project#tab=Home
|
||||
|
||||
### OWASP Mobile Top 10:
|
||||
* https://www.owasp.org/index.php/Mobile_Top_10_2016-Top_10
|
||||
* https://www.owasp.org/index.php/OWASP_Mobile_Security_Project#tab=Top_10_Mobile_Risks
|
||||
|
||||
### OWASP Mobile Security Testing Guide:
|
||||
* https://b-mueller.gitbooks.io/the-owasp-mobile-security-testing-guide/content
|
||||
|
||||
### OWASP Mobile Application Security Verification Standard (MASVS)
|
||||
* https://www.owasp.org/images/6/61/MASVS_v0.9.4.pdf
|
||||
|
||||
## Android
|
||||
|
||||
### Android Reverse Engineering Arsenals
|
||||
* https://www.owasp.org/index.php/OWASP_Mobile_Security_Project#tab=M-Tools
|
||||
|
||||
## Apple iOS
|
||||
|
||||
### Damn Vulnerable iOS Application (DVIA)
|
||||
* DVIA Home Page
|
||||
* http://damnvulnerableiosapp.com
|
||||
|
||||
* DVIA OWASP Project Page
|
||||
* https://www.owasp.org/index.php/OWASP_DVIA
|
||||
|
||||
* DVIA Github Source
|
||||
* https://github.com/prateek147/DVIA
|
||||
|
||||
* DVIA Learning Resources
|
||||
* http://damnvulnerableiosapp.com/#learn
|
Loading…
Reference in a new issue