A local Android DoS Exploit for API 29 and API 30
☆64Feb 22, 2023Updated 3 years ago
Alternatives and similar repositories for StartFlagExploit
Users that are interested in StartFlagExploit are comparing it to the libraries listed below
Sorting:
- Library intended to hook Binder interface and manipulate events☆117Sep 28, 2022Updated 3 years ago
- Android ART hooking native library supporting Android 5.0 to 10.0☆20Dec 19, 2019Updated 6 years ago
- Docker image for hacking☆21Feb 10, 2025Updated last year
- Cross-Site Scripting (XSS) vulnerability analyzer☆21Feb 13, 2026Updated 2 weeks ago
- A simple python script to exploit vulnerable Firebase Database. If the owner of the app have set the security rules as true for both "rea…☆22Apr 22, 2024Updated last year
- YARA rule-based automation system to detect network attacks at byte-level☆13May 12, 2021Updated 4 years ago
- Tool for viewing Android package details, including permissions, services, activities, and more.☆22Nov 30, 2012Updated 13 years ago
- 基于Xposed Hook敏感API☆14Mar 11, 2022Updated 3 years ago
- All Shell In One. Generate Reverse Shells and/or generate single code that runs all the payloads.☆10Mar 25, 2021Updated 4 years ago
- SecrutiyTube Linux Assembly Exam☆11Dec 30, 2019Updated 6 years ago
- Hack Android Runtime (ART) using chickenhook☆26Dec 26, 2019Updated 6 years ago
- A linux / android / MacOS hooking framework☆118Jun 12, 2022Updated 3 years ago
- Automated NoSQL database enumeration and web application exploitation tool.☆25May 6, 2019Updated 6 years ago
- Demangle compiled symbols online.☆14Feb 5, 2017Updated 9 years ago
- Silent Screenshot Capture | Post Exploitation Payload | VB.NET☆13May 10, 2020Updated 5 years ago
- ☆13Jul 29, 2020Updated 5 years ago
- SubDomain Finder☆13Nov 9, 2021Updated 4 years ago
- a java decompiler demo☆15Mar 29, 2024Updated last year
- The Mobile App Pentest cheat sheet was created to provide concise collection of high value information on specific mobile application pen…☆16Apr 11, 2017Updated 8 years ago
- A practice for kotlin.☆11Mar 12, 2019Updated 6 years ago
- ELF binary file format parser in C☆13Jul 17, 2021Updated 4 years ago
- A Binary Ninja plugin to disassemble bytecode for PlaidCTF 2020 challenge "That's a Lot of Fish"☆13Apr 19, 2020Updated 5 years ago
- Python script that automate the process of generating various reverse shells.☆15Mar 22, 2021Updated 4 years ago
- Simple but sharp ransomware☆35Jul 11, 2020Updated 5 years ago
- CyberQueens lesson materials - learning resources and exercises for aspiring reverse engineers, exploit developers, and hackers 👩💻👨�…☆31Oct 24, 2022Updated 3 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆17Dec 6, 2020Updated 5 years ago
- Next generation cyber security research and testing software.☆16Mar 18, 2021Updated 4 years ago
- A collection of my (horribly organized, incomplete and unhelpful) notes for several challenge sites☆11Jun 29, 2016Updated 9 years ago
- Nextcloud app to let users request a data export or account removal☆19Updated this week
- ☆16May 15, 2020Updated 5 years ago
- 🔂 The client updater server informs clients about new updates☆13Updated this week
- 🐊 A small Password Attack☆15Apr 1, 2024Updated last year
- Write java hook with frida☆54Jun 7, 2020Updated 5 years ago
- App that detects if is running on an emulated environment☆13May 15, 2020Updated 5 years ago
- It becomes the extension of Burp suite. The cookie set by the BipIP server may include a private IP, which is an extension to detect tha…☆16Dec 8, 2025Updated 2 months ago
- Simple Android ARM&ARM64 GOT Hook☆37Jun 8, 2022Updated 3 years ago
- Hackers Hunter : Hunt down and track CTF Players & Bug Hunters etc accounts by username across in most places where you can find them☆17Feb 1, 2021Updated 5 years ago
- Instrument code to trace memory☆19Feb 15, 2019Updated 7 years ago
- We try to put source files of llvm tutorials here☆18Oct 6, 2020Updated 5 years ago