M507 / Android-Tester-Panel-AppLinks
It provides configurable shortcuts to help make the pre-qual/testing process more efficient.
☆11Updated 3 years ago
Alternatives and similar repositories for Android-Tester-Panel-App
Users that are interested in Android-Tester-Panel-App are comparing it to the libraries listed below
Sorting:
- A simple tool to allows users to search for and analyze android apps for potential security threats and vulnerabilities☆88Updated last year
- ☆14Updated 10 months ago
- APK Infrastructure Investigator☆65Updated 2 years ago
- SSH Backdoor for android☆12Updated last year
- Burp suite Certificate modification tool☆18Updated 2 years ago
- Automated HTTP Request Repeating With Burp Suite☆40Updated 2 years ago
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆12Updated 3 years ago
- ☆19Updated 2 years ago
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 3 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆22Updated 3 years ago
- Android Penetration Testing setup tool. Garuda automates the installation of the required tools to perform Android Security Analysis.☆73Updated 2 years ago
- This tool is useful in case you want to evade the detection based on simple rules when trying to dump the SAM, SYSTEM or SECURITY hives u…☆10Updated 3 years ago
- Basics on commands/tools/info on how to do binary exploitation on a mobile phone☆56Updated 2 years ago
- hiding in plain sight: part 2☆44Updated last year
- A tool capable of bypassing easy root detection mechanisms by patching applications automatically (without frida).☆33Updated last year
- Automate All Pivoting System Enumeration with this Bash Script☆13Updated 3 years ago
- "Ghost (RAT)" -> Reverse shell and management console for Windows☆18Updated 3 years ago
- Cryptanalysis of the DAO exploit & Multi-Stage Attack☆19Updated last year
- This repository hosts PoC exploits for vulnerabilities I've discovered, provided for education and to highlight the importance of system …☆19Updated 2 years ago
- An Vulnerability detection and Exploitation tool for CVE-2024-24919☆25Updated last year
- An automated e-mail OSINT tool☆23Updated 3 years ago
- There were no proper POCs for CVE-2023-30533 so I made one. (Reported by Vsevolod Kokorin)☆12Updated 2 years ago
- Collection of (4000+) malicious rMQR Codes for Penetration testing, Vulnerability assessments, Red Team operations, Bug Bounty and more☆57Updated last year
- ARP Spoofing Defender is a project designed to protect local networks from ARP Spoofing attacks. ARP Spoofing Defender provides mechanism…☆23Updated 2 months ago
- Rockyou for web fuzzing☆15Updated 4 years ago
- A python script to check if URLs are allowed or disallowed by a robots.txt file.☆23Updated 11 months ago
- my own 2fa bypass methodolgy☆27Updated 2 years ago
- Detect code obfuscation through text classification in the detection process.☆45Updated 2 years ago
- Basics on commands/tools/info on how to do a forensic analysis of a mobile phone☆30Updated 2 years ago
- BlueStacks privilege escalation through VM backdooring☆21Updated last year