☆19Jun 22, 2015Updated 10 years ago
Alternatives and similar repositories for iPadRestrictionsCodeBypass
Users that are interested in iPadRestrictionsCodeBypass are comparing it to the libraries listed below
Sorting:
- IDA scripts that facilitate reverse engineering☆16Aug 10, 2016Updated 9 years ago
- Fuzzing web services in style with nodejs☆10Aug 10, 2019Updated 6 years ago
- Chrome extension for blocking x-origin cookies☆12Jul 5, 2016Updated 9 years ago
- A Burp Suite extension that checks if a particular URL responds differently to various User-Agent headers☆15Sep 4, 2014Updated 11 years ago
- ☆10Jan 22, 2016Updated 10 years ago
- Scripts used for phishing campaigns☆14Aug 18, 2014Updated 11 years ago
- ☆15Jan 14, 2016Updated 10 years ago
- Customizable lazy exploit pattern utility.☆13Oct 2, 2022Updated 3 years ago
- implementation of some concepts in Security and Exploiting☆13Aug 24, 2015Updated 10 years ago
- ☆13Oct 29, 2014Updated 11 years ago
- Open source reverse-engineering tool, mainly targeted towards embedded systems☆22Sep 27, 2009Updated 16 years ago
- Alternative hexdump.☆15Feb 4, 2016Updated 10 years ago
- Some tools for EFI hackery☆41Feb 25, 2012Updated 14 years ago
- A QEMU based framework for instrumenting x86 programs from Python☆17Oct 5, 2020Updated 5 years ago
- An x86 PC emulator☆23Feb 22, 2013Updated 13 years ago
- PS Vita Webkit Exploit / Mini SDK and Testing Framework☆34Nov 6, 2014Updated 11 years ago
- A simple example of dropping a PHP backdoor on a pfSense firewall over xmlrpc.php☆20Apr 16, 2015Updated 10 years ago
- Burp Intruder File Payload Generator☆18Oct 27, 2019Updated 6 years ago
- ☆21Mar 24, 2015Updated 10 years ago
- A simple tool to help reverse engineers while dealing with obfuscated code.☆20Sep 5, 2016Updated 9 years ago
- CFURL Cache inspector for Burp Suite☆18Dec 8, 2020Updated 5 years ago
- A Burp Suite extension that starts scanning on requests it sees, and dumps results on standard output☆21Aug 11, 2016Updated 9 years ago
- BurpCSJ extension for Burp Pro - Crawljax Selenium JUnit integration☆34Dec 22, 2014Updated 11 years ago
- Functions and other Code Snippets often found in Offensive Code or Malware☆22Apr 20, 2015Updated 10 years ago
- Working Rsh Client With Bind/Reverse Shell☆19Sep 15, 2015Updated 10 years ago
- in-memory fuzzing with gdb☆21Feb 10, 2016Updated 10 years ago
- ParrotNG is a tool capable of identifying Adobe Flex applications (SWF) vulnerable to CVE-2011-2461☆48Mar 19, 2015Updated 10 years ago
- A sample AWS Lambda function to push EC2 Auto Scaling notifications to IFTTT via the Maker channel☆21Jul 26, 2015Updated 10 years ago
- A small utility to read and write to Macs physical memory using default AppleHWAccess.kext.☆25Sep 3, 2015Updated 10 years ago
- GDB commands to aid exploit development☆46Sep 9, 2016Updated 9 years ago
- OSX Security Compliance & Hardening☆47Aug 13, 2015Updated 10 years ago
- REST/JSON interface to Burp Suite☆33Oct 12, 2020Updated 5 years ago
- Weape-Wireless-EAP-Extractor☆29Sep 1, 2013Updated 12 years ago
- Mach Fuzzing Tools☆32Oct 24, 2013Updated 12 years ago
- Integrity checking script for Apple Thunderbolt to Ethernet adapters, to check for attacks similar to Thunderstrike 2☆26Aug 7, 2015Updated 10 years ago
- A tool for calculating necessary SQL Server permissions☆23Feb 9, 2015Updated 11 years ago
- Parses Nmap XML files☆25Apr 29, 2015Updated 10 years ago
- Dump page tables on various OSes and analyze them☆31Jan 15, 2016Updated 10 years ago
- Generates vfdecrypt key for iPhoneOS 3.x/4.x filesystem☆46Aug 23, 2011Updated 14 years ago