HuntDownProject / KoodousFinderLinks
A simple tool to allows users to search for and analyze android apps for potential security threats and vulnerabilities
☆87Updated last year
Alternatives and similar repositories for KoodousFinder
Users that are interested in KoodousFinder are comparing it to the libraries listed below
Sorting:
- Android Penetration Testing setup tool. Garuda automates the installation of the required tools to perform Android Security Analysis.☆72Updated 2 years ago
- APK Infrastructure Investigator☆65Updated 2 years ago
- Cloning apk for bypassing code tampering detection, Google Safety Net and scanning vulnerable plugins☆84Updated 2 years ago
- Automated HTTP Request Repeating With Burp Suite☆40Updated 2 years ago
- An intentionally vulnerable Android Application to demonstrate various vulnerabilities that airses in Android Components.☆37Updated 6 months ago
- simple recon tool to help you for searching vulnerability on web server☆73Updated 8 months ago
- Unauthorized Access to Metadata and User Data like CTF☆27Updated 10 months ago
- Web Path Finder☆61Updated last year
- A simple utility to perform reverse WHOIS lookups using whoisxml API☆44Updated 2 years ago
- Scripts to set up your own Android 📱 app hacking lab☆91Updated last year
- Burp Suite extension that makes your life easier by tucking the headers out of the way, so you can see the body content right away withou…☆39Updated 2 years ago
- Gouge is a simple Burp extension to extract or gouge all URLs which are seen in JS files as you visit different websites/webpages in Burp…☆29Updated last year
- damn-exploitable-android-app-apk☆39Updated 2 years ago
- Android App Reverse Engineering & Analysis Toolkit☆17Updated last year
- Burp extension used to snip any header from all the requests.☆23Updated last year
- ☆13Updated 7 months ago
- Tips, Tricks, and Scripts for Linux Post Exploitation☆38Updated 2 years ago
- Offensive Security MISC Annotations and Payloads for Ethical Hackers / Security Researchers☆29Updated 10 months ago
- 「🧱」Test a list of payloads and see if you can bypass it☆61Updated 3 years ago
- ☆19Updated 2 years ago
- Nuclei template for CVE-2024-23897 (Jenkins LFI Vulnerability)☆20Updated last year
- Several scripts are based on the Netlas.io search engine. They will allow you to carry out the reconnaissance phase before the pen test i…☆43Updated 5 months ago
- Mobile Helper Framework (mhf) is a tool that automates the process of identifying the framework/technology used to create a mobile applic…☆24Updated last year
- Subtron is a professional-grade subdomain enumeration toolkit designed for security researchers, penetration testers, and bug bounty hunt…☆23Updated last month
- Detect code obfuscation through text classification in the detection process.☆44Updated last year
- A python3 script searching for secret on swaggerhub☆66Updated 3 years ago
- Static and dynamic Android application security analysis☆73Updated last year
- Monitor your target continuously for new subdomains!☆24Updated 2 years ago
- Tools used for Pentesting☆21Updated 2 years ago
- Fetch data (open ports, CVEs, CPEs, ...) from shodan internetDB API☆92Updated 2 years ago