A tool to speed up Android pentesting by automating the APK acquisition and information gathering
☆18Jul 6, 2022Updated 3 years ago
Alternatives and similar repositories for AndroidBlastOff
Users that are interested in AndroidBlastOff are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- The Recon scanning tool scans websites for open files & directories specified in the custom config file. Default server configuration fil…☆15Apr 4, 2018Updated 8 years ago
- Dashboard/API + DNS/HTTP Servers to identify Out of Band Resolution in Payloads☆38Jun 10, 2021Updated 4 years ago
- Get latest Exploit Databases notification on your Desktop☆16Jan 29, 2020Updated 6 years ago
- Automatically extracts API Keys from APK files☆14Feb 1, 2022Updated 4 years ago
- AES Ransomware in batch☆12Jun 25, 2024Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- notorious BIG IP☆15Aug 8, 2019Updated 6 years ago
- Fastly scans open ports on large networks and bruteforce login mechanism of found services☆12Aug 24, 2019Updated 6 years ago
- gathers the XSS cheatsheet payloads and creates a usable wordlist☆74Jan 4, 2021Updated 5 years ago
- A local scanner for vulnerable web applications☆41Updated this week
- ☆12Oct 16, 2017Updated 8 years ago
- The knife of the Admin & Security auditor☆42Feb 12, 2020Updated 6 years ago
- 🌎 A command-line application to help determine the location information from a given ip address or url.☆21Mar 29, 2017Updated 9 years ago
- Deeplack is a python script designed for comparing images (screenshots) using DeepAI to detect changes on websites.☆14Jun 19, 2019Updated 6 years ago
- little scripts created during my time as a pentetration tester☆31Jun 17, 2012Updated 13 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- This is a large list of ransomware decryptor from various link. Consist from various type of ransomware. Feel free to contribute.☆17Mar 3, 2017Updated 9 years ago
- Vulnerable Bank Web Application for Cyber Security Course☆13Dec 11, 2022Updated 3 years ago
- Automatic tool using for crawling code to find low-hang fruit vulnerabilities - Based on OWASP Secure Code Review Guide☆21Aug 31, 2020Updated 5 years ago
- A Torrent Magnet Link Scrapper☆14Dec 4, 2019Updated 6 years ago
- A scripted library of hacking techniques.☆18Jul 18, 2018Updated 7 years ago
- Finds Directory Listings or open S3 buckets from a list of URLs☆52Dec 1, 2021Updated 4 years ago
- A simple tool with the power of "Go" to find the hidden Vhosts defined at the server.☆19Jan 3, 2019Updated 7 years ago
- ☆14Jun 19, 2018Updated 7 years ago
- A lookup tool created to explore the NJ Arrest file from the FBI. Created for Hack Jersey 2.0☆14Apr 1, 2015Updated 11 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- CircleCI log and security configuration automations☆22Sep 20, 2020Updated 5 years ago
- Search the ExploitDB with a little more control☆22Jun 4, 2017Updated 8 years ago
- A tool that turns the authoritative nameservers of DNS providers to resolvers and resolves the target domain list. Please think of this a…☆25Sep 19, 2019Updated 6 years ago
- 🎥 Brickcom Private Security Cam's Scan and Exploit Improper view DataBase 📺 Watching priv8 (records 📼) in real time from almost countr…☆21Jan 16, 2019Updated 7 years ago
- Python proof-of-concept for breaking passwords with a microphone, using machine learning.☆22Dec 29, 2019Updated 6 years ago
- ☆17Mar 21, 2019Updated 7 years ago
- An advance keylogger that works and also logs special keys.☆16May 27, 2022Updated 3 years ago
- A framework for automating penetration testing using a plugin based architecture☆42May 20, 2022Updated 3 years ago
- Check your email(s) using popular online services to see if it appears in any data-breach☆30Jan 11, 2026Updated 3 months ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Concurrently test bing results for shellshock vulnerability☆42Sep 27, 2014Updated 11 years ago
- ☆16Aug 16, 2022Updated 3 years ago
- My pentest cheat sheet☆16Apr 27, 2017Updated 9 years ago
- Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing…☆12Oct 6, 2020Updated 5 years ago
- OnePlus 7/7P/7T/7TP unified nethunter kernel with focus on bb and perf | EOL☆18Aug 7, 2021Updated 4 years ago
- OSINT license plate data by scraping lookup site(s)☆13Apr 2, 2023Updated 3 years ago
- ☆27Mar 18, 2020Updated 6 years ago