Vulnerable Mobile Apps

📱 Best Vulnerable Mobile Apps for Learning Mobile App Pentesting

1. DVIA (Damn Vulnerable iOS App)


2. DVIA-v2 (Damn Vulnerable iOS App v2)


3. Damn Vulnerable Android App (DVAA) / InsecureBank


4. MOBSF + Custom APKs


5. DroidGoat


6. OWASP GoatDroid


7. Android-InsecureBank


🛠️ Tools You’ll Want for Mobile Pentesting

Tool
Purpose

Burp Suite

Intercept mobile traffic, test insecure APIs

MobSF

Static + dynamic analysis of APKs & iOS apps

Frida

Instrument and hook mobile apps at runtime

Jadx / Apktool

Reverse engineer APKs

Objection

Mobile exploitation framework for Android/iOS

Genymotion or Android Emulator

Run test environments

Charles Proxy / MITMProxy

Alternative intercept proxies

Frida CodeShare

Reuse community Frida scripts


🔍 Online Platforms and Training for Mobile App Security

🔹 Mobile Security Testing Guide (MSTG by OWASP)


🔹 PentesterLab – Mobile Challenges


🔹 TryHackMe — Mobile Hacking Room


🔹 HackTheBox — Mobile Challenges


Absolutely — here’s more for you: deeper cuts into vulnerable mobile apps, realistic mobile CTFs, and specialized tools you can use to sharpen your Android/iOS pentesting skills even further.


🔥 More Vulnerable Mobile Apps & CTFs (Android & iOS)

8. InsecureShop


9. BodgeIt Store (Mobile API Backend)

  • What it is: While not a mobile app itself, you can build a simple mobile client for this vulnerable web service to test mobile API attacks.

  • Use case: Learn how broken APIs can be exploited from mobile apps.


10. Vulnerable Mobile Apps Collection (Awesome List)


11. OWASP MSTG Test App (iOS & Android)


12. AndroidCrackMe & iOSCrackMe Collections

  • Small apps designed to practice reverse engineering and logic bypasses.

  • Focus on: Authentication bypass, string decryption, Frida hooks.

  • Hosted under OWASP MSTG or CodeShare.


13. Reverse Engineering Challenges on CTF Platforms

These often include mobile apps (.apk or .ipa files):


🧪 Advanced Tools for Mobile Pentesting (Beyond the Basics)

Tool
Use Case

Frida + Objection

Runtime instrumentation, bypassing root detection, SSL pinning

MobSF Dynamic Analysis + API Proxy

Hook into emulator or physical device

Needle (by MWR Labs)

Full iOS pen testing framework (needs jailbroken device)

Apktool + JADX + Bytecode Viewer

Full APK decompilation & code inspection

QARK (Quick Android Review Kit)

Static analysis for APKs

drozer (now archived)

Android attack framework (good for exploiting IPC, content providers)


🧱 Setting Up Your Lab (If You Haven’t Already)

🖥️ For Android

  • Android Studio AVD (emulator)

  • Genymotion (GUI-friendly emulator)

  • MobSF (dynamic mode with emulator or Genymotion)

  • Burp Suite (with certificate installed on emulator/device)

  • Frida + Objection

🍏 For iOS (more complex)

  • Jailbroken device OR checkra1n-compatible test device

  • macOS + Xcode + iOS Simulator

  • Frida + Objection or Needle

  • Burp with proxy configuration


Last updated