Exploit locally. Capture the flag remotely.

This demo shows the full DroidGround flow: you receive a placeholder APK to develop your exploit locally, then you switch to the real DroidGround instance where the target app contains the actual flag. Install the exploit app using the team token, run your exploit and exfiltrate the flag via the exploit server, and grab the win.
This is just a simple example and the real flag can be easily retrieved from GitHub. The purpose is to showcase the most prominent features of DroidGround.
In a real CTF each team would have their own personal token while in this case the UNLIMITED TEAMS mode is enabled and you can grab a personal token any time you want.

What you'll do

CTF-style
  • 1
    Download the placeholder APK
    Build and test your exploit app locally.
  • 2
    Open the DroidGround instance
    Head to /demo, join the shared team, install the exploit app using the token.
  • 3
    Exploit + fetch the flag
    Use the exploit server to run your chain against the real target app.
This environment resets hourly
Any apps installed will be removed alongside with the generated TOKENS.

Get the Source

Want to use DroidGround in your internal lab or for a CTF challenge? The GitHub repo has everything you need.

Demo environment for learning and showcasing a sample workflow. Please be respectful.