AymanRbati / root-detection-bypassLinks
A tool capable of bypassing easy root detection mechanisms by patching applications automatically (without frida).
☆30Updated last year
Alternatives and similar repositories for root-detection-bypass
Users that are interested in root-detection-bypass are comparing it to the libraries listed below
Sorting:
- Insecure Android Application for testing Biometric bypasses☆12Updated 2 years ago
- ☆14Updated 3 months ago
- Enumeration & fingerprint tool☆25Updated last year
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆26Updated 2 years ago
- This tool is useful in case you want to evade the detection based on simple rules when trying to dump the SAM, SYSTEM or SECURITY hives u…☆10Updated 2 years ago
- ☆28Updated last year
- Search for sensitive data in Postman public library. Original work from https://github.com/cosad3s/postleaks☆26Updated last year
- A straightforward tool for exploiting SMTP Smuggling vulnerabilities.☆15Updated 11 months ago
- Collection of scripts that I created to make my life easier.☆11Updated 4 years ago
- FireProx written in Go☆20Updated last year
- A python script to check if URLs are allowed or disallowed by a robots.txt file.☆22Updated 4 months ago
- A BrainF*ck Inspired Shell Obfuscation Proof-of-Concept☆16Updated last year
- MacroPhantom automates the process of generating XOR+Caesar encrypted shellcode and embedding it into VBA macros for Microsoft Office doc…☆12Updated 3 months ago
- Detect code obfuscation through text classification in the detection process.☆45Updated last year
- Exploit POC for CVE-2024-22026 affecting Ivanti EPMM "MobileIron Core"☆15Updated last year
- This script is designed to exploit a heap buffer overflow vulnerability in a socks5 proxy server.☆21Updated last year
- Monitor your target continuously for new subdomains!☆26Updated 2 years ago
- BlueStacks privilege escalation through VM backdooring☆21Updated 11 months ago
- The Catherine Framework is a general-purpose cybersecurity framework built to provide extended support for defense operations.☆16Updated last year
- An Vulnerability detection and Exploitation tool for CVE-2024-7339☆17Updated 10 months ago
- ☆12Updated last year
- ☆18Updated 6 months ago
- An Android SSL Pinning Remover tool for Security research and Bug Bounty☆43Updated 2 years ago
- This repository is to provide a write-up and PoC for CVE-2023-41717.☆12Updated last year
- Recon(Amass, Naabu, Nuclei) workflow with Github Actions☆17Updated 7 months ago
- A Python script to find tenant id an region from a list of domain names.☆15Updated 4 months ago
- Right-To-Left Override POC☆34Updated 3 years ago
- Slides and videos from talks given at cons☆20Updated last week
- Multithreaded spraying of a password on all accounts of a domain.☆20Updated 4 months ago
- A modified version of TomNomNom's anew, allowing for multiple files to be defined as parameters.☆13Updated 2 years ago