Apple BLE proximity pairing message spoofing
☆19Aug 29, 2023Updated 2 years ago
Alternatives and similar repositories for AppleJuice
Users that are interested in AppleJuice are comparing it to the libraries listed below
Sorting:
- Terraform Dojo Challenge☆22Oct 16, 2018Updated 7 years ago
- Mobile Helper Framework (mhf) is a tool that automates the process of identifying the framework/technology used to create a mobile applic…☆26Dec 23, 2025Updated 3 months ago
- Simple python script to evade antiviruses on fully patched and updated Windows environments using a py2exe.☆20Oct 24, 2022Updated 3 years ago
- Send messages or files between devices using an encrypted audio transfer.☆14Apr 23, 2024Updated last year
- A Cobalt Strike Beacon Notifier Via Telegram Bot.☆19Dec 2, 2023Updated 2 years ago
- Tool to automate corporate network segmentation test☆21Aug 6, 2020Updated 5 years ago
- ⚑ We put the "ethical" in "ethical hacking." ⚑☆13Feb 14, 2021Updated 5 years ago
- Keep Your Sandbox Tight! – Actually just a collection of my own tight sandbox configurations.☆16Jan 22, 2025Updated last year
- Torresmo config☆16Mar 11, 2026Updated last week
- Rust-based password mutator for brute force attacks☆13Mar 21, 2025Updated last year
- Random stuff I write for no specific reason.☆48Updated this week
- AI/LLM local model integration for analysis of reconftw results☆96May 3, 2025Updated 10 months ago
- MODBUS Penetration Testing Framework☆11Mar 27, 2019Updated 6 years ago
- Smuggler - An HTTP Request Smuggling / Desync testing tool written in Python 3☆14Jul 3, 2025Updated 8 months ago
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆86Jul 12, 2023Updated 2 years ago
- Exploit scripts☆12Apr 10, 2022Updated 3 years ago
- Self-hosted Information Security Management System — ISO 27001, NIS2, GDPR/DSGVO, BSI IT-Grundschutz☆77Updated this week
- Find CVEs associated to Linux and public exploits on github☆120Apr 10, 2025Updated 11 months ago
- msImpersonate - User account impersonation written in pure Python3☆108May 17, 2022Updated 3 years ago
- Neuviks Terraform Red Team Workshop☆14Aug 10, 2025Updated 7 months ago
- Identify binaries with Authenticode digital signatures signed to an internal CA/domain☆40Feb 6, 2024Updated 2 years ago
- A tool to assist in the development of landing pages for phishing campaigns☆15Oct 3, 2022Updated 3 years ago
- mini script para procurar oq precisa!☆11Feb 2, 2023Updated 3 years ago
- a simple x-11 screen recorder written in bash☆16Jul 22, 2022Updated 3 years ago
- A public repo to hold some code review challenges for RSA Conference 2022☆11Jun 3, 2022Updated 3 years ago
- A LLM CTF Challenge☆35Mar 11, 2025Updated last year
- A "Linkedin Account Manager" software built with Node.js and Cypress.☆12Jan 20, 2023Updated 3 years ago
- In this repo I will upload aggregated resources I get from my daily reading of academic papers.☆13Mar 14, 2026Updated last week
- ☆24Sep 23, 2023Updated 2 years ago
- GoTEE - example application☆17Mar 9, 2026Updated 2 weeks ago
- XXE techniques☆14Oct 10, 2021Updated 4 years ago
- Awesome hacking is an awesome collection of hacking tools.☆14Apr 24, 2019Updated 6 years ago
- Deny list generator for password filters☆26Jul 29, 2024Updated last year
- DLL Malware for Signal Desktop. Now utilizes missing dbghelp.dll since Signal patched cryptbase.☆14Jan 24, 2025Updated last year
- It is a project produced to expose the main logic of OSINT-AI tools offered for sale on the DarkWeb☆37Apr 12, 2024Updated last year
- Useful Pentest tool links☆12Aug 13, 2020Updated 5 years ago
- ☆13Mar 7, 2025Updated last year
- Only for education purposes☆18Nov 15, 2021Updated 4 years ago
- Simple Post Quantum File Encryption☆30Jun 26, 2025Updated 8 months ago