Tools and scripts dedicated to Android application security
☆53Mar 3, 2021Updated 5 years ago
Alternatives and similar repositories for android-arsenal
Users that are interested in android-arsenal are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Mobile phone PWN tools and scripts☆16Sep 20, 2020Updated 5 years ago
- OSINT tools and scripts☆57Nov 6, 2020Updated 5 years ago
- All xxx-arsenal repos in one☆17Jan 28, 2019Updated 7 years ago
- Tools and scripts for penetration testing☆19Jun 28, 2020Updated 5 years ago
- Scripts and tool for iOS app reversing☆27Oct 1, 2021Updated 4 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- RDP pentest tools & scripts☆67May 13, 2020Updated 5 years ago
- Apple wireless research and tools☆19Jul 19, 2020Updated 5 years ago
- GSM hacking tools and scripts☆57Jul 22, 2020Updated 5 years ago
- Python libraries for Windows system coding☆15May 13, 2020Updated 5 years ago
- SIP hacking tools and scripts☆23Nov 20, 2020Updated 5 years ago
- Qualcomm baseband hacking stuff☆57Jul 22, 2020Updated 5 years ago
- Simple daemon to create a wifi hotspot on Linux☆14May 17, 2020Updated 5 years ago
- Hacking environment installation scripts for OS X☆28Jan 16, 2022Updated 4 years ago
- SDR tools and scripts☆83Jan 29, 2020Updated 6 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ATM security list☆13Aug 10, 2020Updated 5 years ago
- Scapy tools and scripts☆20Jun 19, 2020Updated 5 years ago
- Tools and scripts for firmware reverse engeneering☆48Sep 18, 2020Updated 5 years ago
- WPS scan and pwn tool☆70Nov 12, 2019Updated 6 years ago
- Bluetooth hacking tools☆484Apr 20, 2023Updated 2 years ago
- ☆28May 26, 2021Updated 4 years ago
- Exploit for Mass Remote Code Execution on GPON home routers (CVE-2018-10562) obtained from Shodan.☆24May 26, 2018Updated 7 years ago
- Exfiltrating "google account password" and "android cookies" made easy with evil browser. Checkout YouTube : https://youtu.be/pvuT0m4QUbU☆14May 11, 2023Updated 2 years ago
- Popping boxes with Nmap☆18Apr 16, 2012Updated 14 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- This document proposes a way of standardising the structure, language, and grammar used in security policies.☆26Jan 29, 2018Updated 8 years ago
- Multithreaded HTTP scanner☆46Jun 3, 2020Updated 5 years ago
- WiFi arsenal☆2,181Jul 6, 2020Updated 5 years ago
- The ORIGINAL decrypted copies of the Shadow Broker's equation_drug release. Contains Equation group's espionage DLL implants library. Use…☆26Jan 29, 2018Updated 8 years ago
- SS7 tools and scripts☆232Jul 6, 2020Updated 5 years ago
- The ORIGINAL decrypted copies of the Shadow Broker's Don't Forget Your Base release. Contains Equation group's collection of tools primar…☆18Jan 29, 2018Updated 8 years ago
- Cyber Kill Chain is a model that Lockheed Martin created for understanding (Describe the sequence of events) and stopping cyberattacks☆11Jan 29, 2024Updated 2 years ago
- all about android reverse engineering☆12Oct 3, 2020Updated 5 years ago
- remote administrator framework☆22Aug 9, 2024Updated last year
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Tools and scripts fro esp8266☆33Mar 25, 2018Updated 8 years ago
- EvilDroid+TheFatRat☆15Oct 18, 2018Updated 7 years ago
- Captive Portal Evasion Tool☆15Sep 4, 2016Updated 9 years ago
- A versatile Android mounting utility for folders, EXT4 images, LUKS/LUKS2 encrypted volumes, regular partitions and more.☆14Jan 29, 2022Updated 4 years ago
- Detects near-by devices such as cell phones, tablets, and laptops. Does this through 802.11, Bluetooth, cell phone protocols, etc..☆19Mar 24, 2014Updated 12 years ago
- Powerful Malware for Termux ;)☆19Apr 9, 2026Updated last week
- Basics on commands/tools/info on how to assess the security of mobile applications☆15Apr 27, 2023Updated 2 years ago