TCP1P / Mobile-POC-TesterLinks
This repository contains the mobile Proof of Concept (POC) tester for CTF challenges. The POC tester is a web application that allows users to test their POCs against a vulnerable Android application. It supports multiple challenges within a single Android emulator.
☆20Updated 4 months ago
Alternatives and similar repositories for Mobile-POC-Tester
Users that are interested in Mobile-POC-Tester are comparing it to the libraries listed below
Sorting:
- ☆86Updated last week
- Slides and videos from my public speeches / conferences☆83Updated last week
- A list of bizarre crackmes☆143Updated 2 weeks ago
- Source code and solution of CTF challenges that I created.☆45Updated 7 months ago
- A burp for intents wannabe☆78Updated last year
- MCP for Pwn☆205Updated this week
- 𝘔𝘢𝘯𝘺 𝘰𝘧 𝘵𝘩𝘦𝘴𝘦 𝘴𝘤𝘳𝘪𝘱𝘵𝘴 𝘢𝘳𝘦 𝘤𝘰𝘭𝘭𝘦𝘤𝘵𝘦𝘥 𝘧𝘳𝘰𝘮 𝘤𝘰𝘶𝘳𝘴𝘦𝘴, 𝘣𝘭𝘰𝘨𝘴, 𝘤𝘰𝘮𝘮𝘶𝘯𝘪𝘵𝘺 𝘳𝘦𝘴𝘰𝘶𝘳𝘤�…☆26Updated 2 months ago
- Beetlebug is an open source insecure Android application with CTF challenges built for Android Penetration Testers and Bug Bounty hunters…☆122Updated 2 years ago
- A flexible playground for Android CTF challenges.☆108Updated this week
- All challenges from DiceCTF 2023☆74Updated 3 years ago
- CTF Writeups☆28Updated last year
- Oversecured Vulnerable iOS App☆231Updated 2 years ago
- Droid LLM Hunter is a tool to scan for vulnerabilities in Android applications using Large Language Models (LLMs).☆82Updated this week
- Challenges and write-ups for GCC-CTF 2024☆18Updated last year
- Writeups of some of the Binary Exploitation challenges that I have solved during CTF.☆21Updated last year
- An intentionally vulnerable Android Application to demonstrate various vulnerabilities that airses in Android Components.☆39Updated 10 months ago
- Detect code obfuscation through text classification in the detection process.☆45Updated 2 years ago
- An automatic Blind ROP exploitation tool☆207Updated 2 years ago
- Type diagram plugin for JADX decompiler☆74Updated last month
- In this Arsenal lab session, we will extract firmware from an EV charger, dig into the firmware, and eventually emulate it so we can inte…☆55Updated 2 years ago
- This repository explain how to write frida hook scripts and analysis written hooks.☆87Updated 2 years ago
- Custom exploits☆28Updated last year
- ☆50Updated 3 weeks ago
- MobSF Remote code execution (via CVE-2024-21633)☆80Updated 2 years ago
- Bypass security checks in IOSSecuritySuite and Rootbear☆53Updated 2 years ago
- How effective are LLMs in identifying and exploiting security vulnerabilities?☆68Updated 11 months ago
- Archive for acez.re blog.☆19Updated 2 years ago
- Attack/Defense services for the 2nd International Cybersecurity Challenge @ San Diego, California USA☆40Updated 2 years ago
- 🐛 UCLA ACM Cyber's Fuzzing Lab☆89Updated 2 months ago
- The House of Rust is a heap exploitation technique that drops a shell against full PIE binaries that don’t leak any addresses.☆34Updated 5 years ago