{"id":13473231,"url":"https://github.com/logicalhacking/DVHMA","last_synced_at":"2025-03-26T17:32:31.029Z","repository":{"id":31970668,"uuid":"35540778","full_name":"logicalhacking/DVHMA","owner":"logicalhacking","description":"Damn Vulnerable Hybrid Mobile App (DVHMA) is an hybrid mobile app (for Android) that intentionally contains vulnerabilities. ","archived":false,"fork":false,"pushed_at":"2018-08-22T08:55:09.000Z","size":12226,"stargazers_count":257,"open_issues_count":0,"forks_count":66,"subscribers_count":14,"default_branch":"master","last_synced_at":"2024-10-15T00:40:19.471Z","etag":null,"topics":["android","cordova","vulnerability","vulnerable-application"],"latest_commit_sha":null,"homepage":"","language":"JavaScript","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":"apache-2.0","status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/logicalhacking.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":null,"funding":null,"license":"LICENSE","code_of_conduct":null,"threat_model":null,"audit":null,"citation":"CITATION","codeowners":null,"security":null,"support":null}},"created_at":"2015-05-13T09:43:05.000Z","updated_at":"2024-09-21T16:09:21.000Z","dependencies_parsed_at":"2022-08-18T23:03:04.488Z","dependency_job_id":null,"html_url":"https://github.com/logicalhacking/DVHMA","commit_stats":null,"previous_names":[],"tags_count":2,"template":false,"template_full_name":null,"repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/logicalhacking%2FDVHMA","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/logicalhacking%2FDVHMA/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/logicalhacking%2FDVHMA/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/logicalhacking%2FDVHMA/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/logicalhacking","download_url":"https://codeload.github.com/logicalhacking/DVHMA/tar.gz/refs/heads/master","host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":222156654,"owners_count":16940437,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["android","cordova","vulnerability","vulnerable-application"],"created_at":"2024-07-31T16:01:01.953Z","updated_at":"2024-10-30T03:32:01.002Z","avatar_url":"https://github.com/logicalhacking.png","language":"JavaScript","readme":"# DVHMA\n\nDamn Vulnerable Hybrid Mobile App (DVHMA) is an hybrid mobile app (for\nAndroid) that *intentionally* contains vulnerabilities. Its purpose is\nto enable security professionals to test their tools and techniques\nlegally, help developers better understand the common pitfalls in\ndeveloping hybrid mobile apps securely.\n\n## Motivation and Scope\n\nThis app is developed to study pitfalls in developing hybrid apps,\ne.g., using [Apache Cordova](https://cordova.apache.org/) or\n[SAP Kapsel](https://blogs.sap.com/2013/10/21/an-introduction-to-smp-kapsel/),\nsecurely. Currently, the main focus is to develop a deeper\nunderstanding of injection vulnerabilities that exploit the JavaScript\nto Java bridge.\n\n## Installation\n\n### Prerequisites\n\nWe assume that the\n\n* Android SDK (https://developer.android.com/sdk/index.html) and \n* Apache Cordova (https://cordova.apache.org/), version 8.0.0 (later\n  versions might work) \n\nMoreover, we assume a basic familiarity with the build system of \nApache Cordova.\n\n### Building DVHMA\n\n#### Setting Environment Variables\n\n    export ANDROID_HOME=\u003cAndroid SDK Installation Directory\u003e\n    export PATH=$ANDROID_HOME/tools:$PATH\n    export PATH=$ANDROID_HOME/platform-tools:$PATH\n\n#### Compiling DVHMA\n\n    cd DVHMA-Featherweight\n    cordova plugin add ../plugins/DVHMA-Storage\n    cordova plugin add ../plugins/DVHMA-WebIntent \n    cordova platform add android\n    cordova compile android\n\n#### Running DVHMA in an Emulator\n\n    cordova run android \n\n## Team Members\n\nThe development of this application started as part of the project \n[ZertApps](http://www.zertapps.de). ZertApps was a collaborative \nresearch project funded by the German Ministry for Research and \nEducation. It is now developed and maintained by the [Software \nAssurance \u0026 Security Research Team](https://logicalhacking.com) \nat The University of Sheffield, UK. \n\nThe core developers of DVHMA are:\n* [Achim D. Brucker](http://www.brucker.ch/)\n* [Michael Herzberg](http://www.dcs.shef.ac.uk/cgi-bin/makeperson?M.Herzberg)\n\n## License\n\nThis project is under the Apache 2.0 License. \n\nSPDX-License-Identifier: Apache-2.0\n\n## Master Repository\n\nThe master git repository for this project is hosted by the [Software\nAssurance \u0026 Security Research Team](https://logicalhacking.com) at\n\u003chttps://git.logicalhacking.com/DASCA/DVHMA/\u003e.\n\n## Publications\n\n* Achim D. Brucker and Michael Herzberg. [On the Static Analysis of\n  Hybrid Mobile Apps: A Report on the State of Apache Cordova\n  Nation.](https://www.brucker.ch/bibliography/download/2016/brucker.ea-cordova-security-2016.pdf)\n  In International Symposium on Engineering Secure Software\n  and Systems (ESSoS). Lecture Notes in Computer Science (9639), pages\n  72-88, Springer-Verlag, 2016.\n  https://www.brucker.ch/bibliography/abstract/brucker.ea-cordova-security-2016\n  doi: [10.1007/978-3-319-30806-7_5](http://dx.doi.org/10.1007/978-3-319-30806-7_5)\n","funding_links":[],"categories":["Android","JavaScript","JavaScript (485)","Support","Vulnerable Mobile apps:","Awesome Mobile Application Penetration Testing  ![awesome](https://awesome.re/badge.svg)"],"sub_categories":["Labs","Android","Mobile Penetration Testing Lab"],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Flogicalhacking%2FDVHMA","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Flogicalhacking%2FDVHMA","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Flogicalhacking%2FDVHMA/lists"}