AymanRbati / root-detection-bypass
A tool capable of bypassing easy root detection mechanisms by patching applications automatically (without frida).
☆30Updated 9 months ago
Alternatives and similar repositories for root-detection-bypass:
Users that are interested in root-detection-bypass are comparing it to the libraries listed below
- A straightforward tool for exploiting SMTP Smuggling vulnerabilities.☆15Updated 8 months ago
- RabbitMQ exploit and Pentesting guide for penetration tester☆16Updated last year
- A Python script to find tenant id an region from a list of domain names.☆14Updated 2 months ago
- This tool is useful in case you want to evade the detection based on simple rules when trying to dump the SAM, SYSTEM or SECURITY hives u…☆10Updated 2 years ago
- Search for sensitive data in Postman public library. Original work from https://github.com/cosad3s/postleaks☆26Updated last year
- Multithreaded spraying of a password on all accounts of a domain.☆20Updated 2 months ago
- A python script to check if URLs are allowed or disallowed by a robots.txt file.☆21Updated 2 months ago
- Insecure Android Application for testing Biometric bypasses☆12Updated 2 years ago
- visually see issues with supported cipher suites☆16Updated 10 months ago
- ☆13Updated 3 weeks ago
- FireProx written in Go☆19Updated last year
- Detect code obfuscation through text classification in the detection process.☆45Updated last year
- Application for showcasing Android Deep Link and WebView Vulnerabilities☆14Updated 2 years ago
- A complete security assessment tool that supports common web security issues scanning and custom POC | Be sure to read the document befor…☆20Updated 6 months ago
- H&E- Burp Highlighter and Extractor☆18Updated 2 years ago
- To run Burpsuite from launcher, You may run it in terminal by script, But by this tool you will able to run it from Launcher with a Burp …☆11Updated last year
- Enumeration & fingerprint tool☆24Updated last year
- The process involves downloading the latest version and automatically configuring it within the Termux Android application. Subsequently,…☆15Updated 2 weeks ago
- This repository hosts PoC exploits for vulnerabilities I've discovered, provided for education and to highlight the importance of system …☆18Updated 2 years ago
- A simple tool to allows users to search for and analyze android apps for potential security threats and vulnerabilities☆84Updated last year
- PoC for Exploiting CVE-2024-31848/49/50/51 - File Path Traversal☆16Updated 11 months ago
- An issue discovered in Telesquare TLR-2005Ksh 1.0.0 and 1.1.4 allows attackers to run arbitrary system commands via the Cmd parameter.☆15Updated 10 months ago
- ☆27Updated last year
- ☆29Updated 2 years ago
- An Vulnerability detection and Exploitation tool for CVE-2024-7339☆18Updated 8 months ago
- ☆13Updated 2 years ago
- hiding in plain sight: part 2☆44Updated 9 months ago
- A python script to automatically add a KeyCredentialLink to newly created users, by quickly connecting to them with default credentials.☆21Updated last year
- A script used to query the dehashed API and filter for more useful results☆15Updated 3 years ago
- ☆8Updated 6 months ago