☆42Jul 3, 2016Updated 9 years ago
Alternatives and similar repositories for Android-Sec
Users that are interested in Android-Sec are comparing it to the libraries listed below
Sorting:
- A copy of articles published at Peerlyst☆43Oct 30, 2016Updated 9 years ago
- Documentation featuring how to revoke API keys of different websites☆55Oct 29, 2016Updated 9 years ago
- A collection of various hacking and exploitation tools for hackers and pentesters.☆177Aug 4, 2016Updated 9 years ago
- Powerful plugins and add-ons for hackers☆889Dec 10, 2023Updated 2 years ago
- Awesome tools to exploit Windows !☆1,748May 21, 2022Updated 3 years ago
- A collection of various GitHub gists for hackers, pentesters and security researchers☆961Nov 4, 2017Updated 8 years ago
- Free Security and Hacking eBooks☆17Nov 10, 2017Updated 8 years ago
- A collection of OSCE preparation resources.☆24Oct 30, 2019Updated 6 years ago
- dmg2img converter, used to flash DMG images on the fly on EtchDroid☆16Aug 17, 2018Updated 7 years ago
- A tool for reverse engineering Android apk files 此代码未更改☆11May 24, 2015Updated 10 years ago
- A collection of awesome software, libraries, documents, books, resources and cools stuffs about security.☆14Aug 30, 2017Updated 8 years ago
- Streamlink all-in-one [livestreamer successor] with url input + stream choice dialogs and hidecmd launcher☆15Feb 13, 2020Updated 6 years ago
- A backport of FloatingActionButton to 2.1+☆28Jul 14, 2014Updated 11 years ago
- A collection of handy Bash One-Liners and terminal tricks for data processing and Linux system maintenance.☆15Jul 19, 2020Updated 5 years ago
- Generates the list of active flags in bromite☆17Mar 2, 2026Updated 2 weeks ago
- Evil Twin Attack Bash script☆12Feb 21, 2016Updated 10 years ago
- freegate 7.52☆13Jan 26, 2015Updated 11 years ago
- discord-bot A powerful discord bot with a ton of commands. It can also act as a Music bot & supports Slash Commands☆11May 21, 2023Updated 2 years ago
- Cross Distribution Exploit Testing☆28Sep 23, 2015Updated 10 years ago
- Collection of different ways to execute code outside of the expected entry points☆16Aug 4, 2013Updated 12 years ago
- The ORIGINAL decrypted copies of the Shadow Broker's Don't Forget Your Base release. Contains Equation group's collection of tools primar…☆18Jan 29, 2018Updated 8 years ago
- CVE-2016-2776☆27Oct 3, 2016Updated 9 years ago
- A collection of curated Java Deserialization Exploits☆11May 22, 2018Updated 7 years ago
- Created by Denis Podgurskiy via the GitHub Connector☆13May 20, 2021Updated 4 years ago
- ☆19Feb 19, 2025Updated last year
- Free Security and Hacking eBooks☆4,813Jul 10, 2019Updated 6 years ago
- ☆13Jun 6, 2023Updated 2 years ago
- This script generate backdoor code which log username password of an user who have passed HTTP basic auth using LDAP credentials.☆59Apr 3, 2017Updated 8 years ago
- Scripts for OSCE☆18Dec 28, 2018Updated 7 years ago
- ☆10Oct 7, 2020Updated 5 years ago
- Search the social web... Find people & posts on Twitter, Facebook and Google+.☆16May 23, 2014Updated 11 years ago
- A pentesting Firefox spy extension - PoC☆10Jun 16, 2016Updated 9 years ago
- ☆16Jan 12, 2022Updated 4 years ago
- A localhost implementation of a botnet used to perform a credential stuffing attack☆13Jan 14, 2021Updated 5 years ago
- MS17-010☆12Oct 25, 2017Updated 8 years ago
- Simple pytest(pytest.org) plugin which provides fixtures and code to help with running shell commands on tests☆19Oct 22, 2024Updated last year
- Google sync add-on (by ale5000) - it installs Google sync adapters on Android☆19Updated this week
- ☆10Oct 13, 2019Updated 6 years ago
- Easy installers for Maru OS.☆12May 19, 2019Updated 6 years ago