# Recursos de aprendizaje

## Plataformas

### 8KSEC

* [Android Application Exploitation Challenges](https://academy.8ksec.io/course/android-application-exploitation-challenges)
* [iOS Application Exploitation Challenges](https://academy.8ksec.io/course/ios-application-exploitation-challenges)
* [ARM Exploitation Challenges](https://academy.8ksec.io/course/arm-exploitation-challenges)

### Hack The Box

* [Mobile exploitation](https://app.hackthebox.com/tracks/Mobile-Exploitation)
* [Mobile challenges](https://app.hackthebox.com/challenges)
* HTB Academy
  * [Android Application Pentesting Skill Path](https://academy.hackthebox.com/path/preview/android-application-pentesting)

### Mobile Hacking Lab

* [Labs](https://www.mobilehackinglab.com/free-mobile-hacking-labs)

### PentesterLab

* [Android badge](https://pentesterlab.com/badges/android)

### TryHackMe

* [Android Hacking 101](https://tryhackme.com/room/androidhacking101)

## Cursos

* [Hextree](https://app.hextree.io/map/android)
* [Mobile Hacking Lab](https://www.mobilehackinglab.com/courses)
* [NowSecure Academy](https://academy.nowsecure.com/)
* [Securing - iOS Application Security Engineer (iASE)](https://courses.securing.pl/courses/iase)
* [Spartan-Cybersecurity - Curso de Desarrollo Ofensivo en Android (CDOA)](https://academy.spartan-cybersec.com/p/curso-desarrollo-ofensivo-android-cdoa)
* [TCM Security - Mobile Application Penetration Testing](https://academy.tcm-sec.com/p/mobile-application-penetration-testing)

## Libros

* [Frida HandBook](https://learnfrida.info/)

## Certificaciones

* [7CMP - 7ASecurity Certified Mobile Penetration Tester](https://7asecurity.com/course_hacking_android_ios_and_iot_apps_by_example)
* 8KSEC&#x20;
  * [OMSE - Offensive Mobile Security Expert](https://academy.8ksec.io/course/offensive-mobile-reversing-and-exploitation)
  * [CMSE - Certified Mobile Security Engineer](https://academy.8ksec.io/course/practical-mobile-application-exploitation)
  * [CISR - Certified iOS Security Researcher](https://academy.8ksec.io/course/offensive-ios-internals)
  * [CASR - Certified Android Security Researcher](https://academy.8ksec.io/course/offensive-android-internals)
* [CMAE - Certified Mobile AppSec Expert](https://training.enciphers.com/p/mobile-application-security-android-ios)
* [eMAPT - eLearnSecurity Mobile Application Penetration Tester](https://elearnsecurity.com/product/emapt-certification/)
* [GMOB - GIAC Mobile Device Security Analyst](https://www.giac.org/certifications/mobile-device-security-analyst-gmob/)
* Mobile Hacking Lab
  * [CAPT - Certified Android Penetration Tester](https://www.mobilehackinglab.com/course/android-appsec-exam)
  * [CIPT - Certified iOS Penetration Tester](https://www.mobilehackinglab.com/course/ios-appsec-exam)
* [PMPA - Practical Mobile Pentest Associate](https://certifications.tcm-sec.com/pmpa/)
* The SecOps Group
  * [CMPen - Certified Mobile Pentester (Android)](https://pentestingexams.com/certifications/professional/certified-mobile-pentester-cmpen-android/)
  * [CMPen - Certified Mobile Pentester (iOS)](https://secops.group/product/certified-mobile-pentester-cmpen-ios/)


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://mobile.mrw0l05zyn.cl/general/recursos-de-aprendizaje.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
