AymanRbati / root-detection-bypass
A tool capable of bypassing easy root detection mechanisms by patching applications automatically (without frida).
☆30Updated 8 months ago
Alternatives and similar repositories for root-detection-bypass:
Users that are interested in root-detection-bypass are comparing it to the libraries listed below
- A straightforward tool for exploiting SMTP Smuggling vulnerabilities.☆14Updated 6 months ago
- Search for sensitive data in Postman public library. Original work from https://github.com/cosad3s/postleaks☆26Updated last year
- Insecure Android Application for testing Biometric bypasses☆12Updated 2 years ago
- Use the GCP testIamPermissions functionality to bruteforce and discover your permissions☆25Updated 5 months ago
- A script to automate keystrokes through a graphical desktop program.☆33Updated 3 weeks ago
- ☆17Updated 2 months ago
- Beacon Object Files used for Cobalt Strike☆17Updated last year
- powershell script i wrote that can suspend an arbitrary process (with limits)☆20Updated last year
- RCE PoC for Empire C2 framework <5.9.3☆25Updated 11 months ago
- Right-To-Left Override POC☆34Updated 2 years ago
- A cap/pcap packet parser to make life easier when performing stealth/passive reconnaissance.☆21Updated 7 months ago
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆25Updated last year
- ☆21Updated last year
- This repository hosts PoC exploits for vulnerabilities I've discovered, provided for education and to highlight the importance of system …☆18Updated last year
- ☆17Updated last year
- ☆28Updated last year
- Cisco CallManager User Enumeration☆15Updated 2 years ago
- An Vulnerability detection and Exploitation tool for CVE-2024-7339☆17Updated 6 months ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- wsnet☆24Updated this week
- aiohttp LFI (CVE-2024-23334)☆25Updated 11 months ago
- External recon toolkit☆21Updated last month
- Slides and videos from talks given at cons☆13Updated 7 months ago
- This tool is useful in case you want to evade the detection based on simple rules when trying to dump the SAM, SYSTEM or SECURITY hives u…☆10Updated 2 years ago
- Enumeration & fingerprint tool☆24Updated 11 months ago
- ☆16Updated 11 months ago