Oversecured icon
Oversecured icon

Oversecured

Oversecured is an online service designed to search security vulnerabilities in mobile apps. It's adapted to Android security and privacy. It can detect a lot of different attack vectors and privacy issues (starting from known arbitrary code executions, theft/overwrite of...

Oversecured screenshot 1

Cost / License

  • Pay once or Subscription
  • Proprietary

Application type

Platforms

  • Android
  • Software as a Service (SaaS)
-
No reviews
0likes
0comments
0news articles

Features

Suggest and vote on features
  1.  Android Security
  2.  Static Code Analysis

Oversecured News & Activities

Highlights All activities

Recent activities

No activities found.

Oversecured information

  • Developed by

    US flagOversecured Inc
  • Licensing

    Proprietary and Commercial product.
  • Pricing

    One time purchase that costs $10, and / or subscription that costs $0 per month.
  • Alternatives

    1 alternatives listed
  • Supported Languages

    • English

AlternativeTo Category

Development
Oversecured was added to AlternativeTo by oversecured on and this page was last updated .
No comments or reviews, maybe you want to be first?
Post comment/review

What is Oversecured?

Oversecured is an online service designed to search security vulnerabilities in mobile apps. It's adapted to Android security and privacy. It can detect a lot of different attack vectors and privacy issues (starting from known arbitrary code executions, theft/overwrite of arbitrary files, and ending with ability to theft user pictures, fake SMS messages, leak Android app logs, the full list is available here https://oversecured.com/vulnerabilities), the kernel tracks unsafe and potentially dangerous data from the browser, third-party apps, a network shared with an attacher, Bluetooth and NFC connections, SMS messages, local public storage, etc. We accept APK files (Android apps), decompile them to Java sources, and perform analysis against them. An Oversecured's user will receive a report showing a trace of data in the app's sources, displaying where the dangerous data is coming from, sources that will process that data, and the place where's the vulnerability happens.

Official Links