Name: iGoat-Swift
Owner: OWASP
Description: OWASP iGoat (Swift) - A Damn Vulnerable Swift Application for iOS
Created: 2018-04-03 14:40:39.0
Updated: 2018-05-24 08:40:32.0
Pushed: 2018-05-14 07:17:24.0
Size: 10710
Language: C
GitHub Committers
User | Most Recent Commit | # Commits |
---|
Other Committers
User | Most Recent Commit | # Commits |
---|
This is a Swift version of original iGoat project. Using OWASP iGoat, you can learn exploiting and defending vulnerabilities in iOS Swift applications. Developed using
iGoat (Objective C) was presented at:
Vulnerabilities Covered (version 1.0):
Summary | Snapshot :————————-:|:————————-: OWASP TOP 10 Mobile
Reverse Engineering Runtime Analysis Data Protection (Rest) Data Protection (Transit) Key Management Tampering Injection Flaws Broken Cryptography Memory Management URL Scheme Attack Social Engineering SSL Pinning Authentication Jailbreak Detection Side Channel Data Leaks Cloud Misconfiguration* Crypto Challenges |
Documentation: iGoat Wiki
iGoat Quick Setup git clone https://github.com/OWASP/iGoat-Swift.git
and open iGoat-Swift.xcodeproj with xcode.
Setup iGoat Server Navigate to server > docker_packaging and then user command docker compose up
Using Cydia Repo - Open Cydia -> Sources -> Edit and add source http://swiftigoat.yourepo.com/ and then search for iGoat and install it.
Project Lead - Swaroop Yermalkar
Lead Developer - Anthony Gonsalves
To contribute to iGoat project, please contact Swaroop ( swaroop.yermalkar@owasp.org or @swaroopsy )
Junard Lebajan
Tim
Your name can be here :) We give cool iGoat t-shirt and swag!