EyupErgin / DroidDetective
Extended Static Analysis Tool for Analyzing Android APK Files.
☆13Updated 8 months ago
Related projects: ⓘ
- CLI-based 802.11 Rogue (Fake) AP & Hidden AP Spotter☆11Updated 2 weeks ago
- Chista | Open Threat Intelligence Framework☆51Updated 4 months ago
- ☆26Updated this week
- ☆12Updated last year
- ☆11Updated 3 months ago
- Specific C2 Detection Tool Written To Detect C2 Servers From Rhadamanthys Stealer Malware.☆16Updated 10 months ago
- BlackHeart is a simple python script to generate powershell scripts that demonstrate reverse shell gaining without Microsoft Defender res…☆30Updated 5 months ago
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.☆57Updated 8 months ago
- ☆18Updated this week
- ☆10Updated this week
- "Sucosh" is an automated Source Code vulnerability scanner and assessment framework for Python(Flask-Django) & NodeJs capable of performi…☆32Updated 4 months ago
- ☆39Updated 5 months ago
- The Android Penetration Testing Steps repository is intended for security professionals, penetration testers, developers, and anyone who …☆99Updated last year
- ☆10Updated this week
- This repository was developed using .NET 7.0 API technology based on findings listed in the OWASP 2019 API Security Top 10.☆48Updated 10 months ago
- TP-Link Archer T2U Plus / AC600 High Gain USB Wifi Adapter Review & Driver installation Guide for Kali Linux.☆11Updated last year
- ☆12Updated this week
- Open Source Cyber Threat Intelligence Feed Collector☆15Updated 3 years ago
- ☆12Updated this week
- A collection of interesting and diverse Android malware samples☆29Updated last year
- ⚠️ Malware Development training ⚠️☆25Updated last week
- Cloudflare Bypass Script☆22Updated 4 years ago
- ☆43Updated this week
- BTK Akademi Siber Güvenlik Operasyonları Eğitimi Materyalleri☆16Updated 3 months ago
- Privilege Escalation MindMap☆14Updated 4 years ago
- Useful resources about phishing email analysis☆76Updated 2 years ago
- ☆45Updated this week
- stmctf22☆36Updated last year
- ☆12Updated 2 years ago
- Reports of cyber threat intelligence☆14Updated last year