ChrisMcMStone / SpinnerLinks
A tool for automatic black-box detection of missing hostname verification, including for applications that use certificate pinning.
☆19Updated 6 years ago
Alternatives and similar repositories for Spinner
Users that are interested in Spinner are comparing it to the libraries listed below
Sorting:
- Parallel APK analyzer☆51Updated 8 years ago
- A plugin that provides resources for beginners to learn reverse engineering using Binary Ninja. It automatically installs several other p…☆26Updated 8 years ago
- Break Apps with Frida workshop material☆46Updated 8 years ago
- REST/JSON interface to Burp Suite☆33Updated 5 years ago
- A fuzzing script for MitmProxy☆24Updated 10 years ago
- Datajack Proxy allows you to intercept TLS traffic in native x86 applications across platforms☆102Updated 6 years ago
- Office 365 MFA capture toolkit☆13Updated 8 years ago
- A framework to generate unique test cases based on code snippets to test techniques☆54Updated 4 years ago
- McAfee ePolicy 0wner exploit code☆46Updated 7 years ago
- Material from our CANAPE workshop☆32Updated 6 years ago
- DNS Enumeration and Reconnaissance Tool☆36Updated 9 years ago
- This is a tool to instantly test if an application handles SSL certificates the way it is supposed to.☆25Updated 2 years ago
- ☆30Updated 3 years ago
- Materials for 44con 2014 CANAPE Workshop☆23Updated 11 years ago
- VPS infrastructure found in HT dumps☆26Updated 10 years ago
- POLAR☆74Updated 6 years ago
- ☆32Updated 10 years ago
- Data Exfiltration and Command Execution via AAAA Records☆67Updated 9 years ago
- JMSDigger is JMS API basedEnterprise Messaging Application assessment tool☆30Updated 11 years ago
- SMB Auto authentication Vulnerability☆34Updated 9 years ago
- A python implementation of a grep friendly ftrace wrapper☆80Updated 6 years ago
- radare, angr, pwndbg, binjitsu, ect in a box ready for pwning☆75Updated 9 years ago
- Framework for static and dynamic analysis in Android APKs☆32Updated 8 years ago
- Scan for and exploit Consul agents☆40Updated 6 years ago
- A tool for discovering subdomains via third party services and wordlists.☆75Updated 9 years ago
- Mapping of Binaries that allows Arbitrary Code Execution☆26Updated 7 years ago
- ☆12Updated 8 years ago
- Squirtle the Browser-based NTLM Attack Toolkit☆17Updated 10 years ago
- AWS EC2 and S3 Security Auditing Tool☆41Updated 11 years ago
- CANAPE Network Testing Tool☆34Updated 7 years ago