-
Updated
Nov 24, 2020 - Python
mobile-security
Here are 90 public repositories matching this topic...
-
Updated
Nov 23, 2020
-
Updated
Oct 13, 2020 - JavaScript
-
Updated
Nov 25, 2020 - Python
-
Updated
Nov 18, 2020 - Python
-
Updated
Nov 15, 2020 - JavaScript
-
Updated
Jul 27, 2020
-
Updated
May 23, 2019 - JavaScript
-
Updated
Jul 1, 2020 - Java
-
Updated
Aug 30, 2020 - CSS
-
Updated
Nov 24, 2020 - JavaScript
-
Updated
Jun 25, 2020 - JavaScript
-
Updated
Aug 20, 2017 - Java
-
Updated
Feb 2, 2018
-
Updated
Sep 1, 2020
-
Updated
Nov 11, 2020 - TypeScript
-
Updated
Nov 25, 2020 - Vue
-
Updated
Jun 1, 2020 - Python
-
Updated
Dec 18, 2019 - CMake
-
Updated
Oct 28, 2020
-
Updated
Nov 23, 2020 - Java
-
Updated
Nov 3, 2020 - TypeScript
-
Updated
Feb 21, 2020 - Java
-
Updated
May 27, 2020 - Java
-
Updated
Nov 25, 2017 - Python
-
Updated
Oct 8, 2020
-
Updated
Nov 12, 2020 - PHP
-
Updated
May 26, 2020 - Python
Improve this page
Add a description, image, and links to the mobile-security topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the mobile-security topic, visit your repo's landing page and select "manage topics."
Add 8.7 and 8.8 for android and ios: show how you can delay the attacker or report tampering to the backend as a response to a tamper detected
8.7: The app implements multiple mechanisms in each defense category (8.1 to 8.6). Note that resiliency scales with the amount, diversity of the originality of the mechanisms used.
8.8: The detection mechanisms trigger responses of different types, includ