All Projects → nowsecure → Secure Mobile Development

nowsecure / Secure Mobile Development

Licence: other
A Collection of Secure Mobile Development Best Practices

Projects that are alternatives of or similar to Secure Mobile Development

Ios Good Practices
Good ideas for iOS development, by Futurice developers.
Stars: ✭ 10,417 (+2339.58%)
Mutual labels:  apple, best-practices
Wdt Emoji Bundle
Slack like emoji picker with apple/ios, twitter/twemoji, google, emojione, facebook, messenger emoji support
Stars: ✭ 411 (-3.75%)
Mutual labels:  apple
Unit Testing Tips
Unit testing tips by examples in PHP
Stars: ✭ 318 (-25.53%)
Mutual labels:  best-practices
Hackintosh Installer University
Open source tutorial & information collector for hackintosh installation.
Stars: ✭ 3,815 (+793.44%)
Mutual labels:  apple
Shortcutsdirectory
A collection of user-submitted shortcuts for Shortcuts for iOS.
Stars: ✭ 376 (-11.94%)
Mutual labels:  apple
Adhrit
Android Security Suite for in-depth reconnaissance and static bytecode analysis based on Ghera benchmarks.
Stars: ✭ 399 (-6.56%)
Mutual labels:  mobile-security
Superplate
Performance-oriented frontend application creator with popular tools.
Stars: ✭ 368 (-13.82%)
Mutual labels:  best-practices
Mtlpp
C++ Metal wrapper
Stars: ✭ 425 (-0.47%)
Mutual labels:  apple
Clusterlint
A best practices checker for Kubernetes clusters. 🤠
Stars: ✭ 409 (-4.22%)
Mutual labels:  best-practices
Interview
Java 笔试、面试 知识整理
Stars: ✭ 4,119 (+864.64%)
Mutual labels:  gitbook
Solidity Cheatsheet
Cheat sheet and best practices for solidity. Write smart contracts for Ethereum.
Stars: ✭ 384 (-10.07%)
Mutual labels:  best-practices
Android Best Practices
Do's and Don'ts for Android development, by Futurice developers
Stars: ✭ 19,883 (+4556.44%)
Mutual labels:  best-practices
Dl Engineer Guidebook
深度学习工程师生存指南
Stars: ✭ 399 (-6.56%)
Mutual labels:  gitbook
Macs Fan Control
Control fans on Apple computers
Stars: ✭ 373 (-12.65%)
Mutual labels:  apple
Spark Syntax
This is a repo documenting the best practices in PySpark.
Stars: ✭ 412 (-3.51%)
Mutual labels:  best-practices
Istio Handbook
Istio Handbook - Istio Service Mesh Advanced Practical(Istio 服务网格进阶实战) - https://jimmysong.io/istio-handbook
Stars: ✭ 374 (-12.41%)
Mutual labels:  gitbook
Eslint Plugin Testing Library
ESLint plugin to follow best practices and anticipate common mistakes when writing tests with Testing Library
Stars: ✭ 384 (-10.07%)
Mutual labels:  best-practices
Frontend Playbook
The Frontend Playbook
Stars: ✭ 395 (-7.49%)
Mutual labels:  best-practices
Clean Code Typescript
Clean Code concepts adapted for TypeScript
Stars: ✭ 5,075 (+1088.52%)
Mutual labels:  best-practices
Cfpropertylist
PHP Implementation of Apple's PList (binary and xml)
Stars: ✭ 423 (-0.94%)
Mutual labels:  apple

Secure Mobile Development

At NowSecure we spend a lot of time attacking mobile apps - hacking, breaking encryption, finding flaws, penetration testing, and looking for sensitive data stored insecurely. We do it for the right reasons - to help developers make their apps more secure. This document represents some of the knowledge we share with our clients and partners. We are driven to advance mobile app security worldwide.

Using this Guide

This guide gives specific recommendations to use during your development process. The descriptions of attacks and security recommendations in this report are not exhaustive or perfect, but you will get practical advice that you can use to make your apps more secure.

We revise our best practices periodically and invite contributions, and the updated guide is published here as changes are accepted into the main repository.

To learn about all the vectors that attackers might use on your app, read our Mobile Security Primer.

Categories

We categorize our Secure Mobile Development Best Practices under eight topics. You can find a complete table of contents here

Technology Stack

The book is written with GitBook.

Contributing

We revise our best practices periodically and invite contributions, and the updated guide is published here as changes are accepted into the main repository.

We welcome contributions from knowledgeable developers and security professionals. All contributors must read our Contributing page and accept the terms in their Pull Requests. Please follow the template and format provided if you do contribute.

We publish this guide under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.

We will review contributions and periodically publish updated recommendations. If you have questions or feedback please let us know.

Instructions

First fork this repository, make your changes and submit them back to this repository as a Pull Request. If you are unfamiliar with this process, please read the GitHub User Documentation.

Adding a Best Practice

TBD

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].