RASP project for Android app protection
☆13Oct 11, 2024Updated last year
Alternatives and similar repositories for Helldroid
Users that are interested in Helldroid are comparing it to the libraries listed below
Sorting:
- Simple tool for exploiting JWT vulnerabilities☆13Dec 1, 2025Updated 3 months ago
- crtdumper is a Go application designed to interact directly with Certificate Transparency (CT) logs servers and extract domain names fro…☆41Jun 22, 2024Updated last year
- 📲 Apepe is a project developed to help to capture informations from a Android app through his APK file. It can be used to extract the co…☆140Oct 15, 2025Updated 5 months ago
- A simple tool to detect vulnerabilities described here https://portswigger.net/research/browser-powered-desync-attacks.☆35Aug 30, 2022Updated 3 years ago
- Quickly find all identities someone has used on their Github commits☆16Jul 28, 2024Updated last year
- Collaborative repository to catalogue insecure functions in various programming languages.☆11May 9, 2022Updated 3 years ago
- experimental wildcard subdomain filtering prototype☆14Aug 5, 2023Updated 2 years ago
- ☆18Feb 12, 2022Updated 4 years ago
- A tool to extract cookies and passwords from major web browsers, passively, with no process injection.☆57Oct 31, 2025Updated 4 months ago
- My solutions for pwn and reversing challenges☆11Mar 18, 2018Updated 8 years ago
- LLM Vulnerable Application☆13Aug 19, 2023Updated 2 years ago
- Tooling for the OffSec Experienced Pentester (OSEP) and OffSec Exploit Developer (OSED) course☆27Mar 13, 2024Updated 2 years ago
- ArmPro注入器的服务器端源代码,使用ieda编译为jar文件即可使用它到你的服务器。☆30Jul 7, 2024Updated last year
- 安卓APP/API安全加密so库,防二次打包,防API签名破解☆39May 31, 2022Updated 3 years ago
- This repository contains various files linked to Operation Shadowhammer as it was originally discovered by Kaspersky Team.☆12Mar 27, 2019Updated 6 years ago
- A collections of methods to sleep on Windows using common and less-so-common techniques☆13Aug 16, 2024Updated last year
- ☆62Jul 9, 2023Updated 2 years ago
- Js File Scanner☆11Mar 30, 2021Updated 4 years ago
- All things Binary Exploitation, Memory, Assembly and Corruptions.☆10Sep 25, 2020Updated 5 years ago
- A specialized implementation of the Hierarchical Navigable Small World (HNSW) data structure adapted for efficient nearest neighbor looku…☆11Mar 12, 2026Updated last week
- An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface. Implementation of ligolo-ng into sliver☆26Feb 27, 2025Updated last year
- Download a Bunch of Malware for Demos and Testing☆13Sep 28, 2018Updated 7 years ago
- Pipe nmap verbose output to a usable format for httpx or host:port notation.☆15Jul 7, 2022Updated 3 years ago
- Pwn2Win 2020 Challenges☆55May 7, 2021Updated 4 years ago
- Easy crash-reporting for Frida-based applications.☆18Aug 19, 2019Updated 6 years ago
- Audio Transcription for WhatsApp☆15Jun 28, 2024Updated last year
- Android AntiCheat☆48May 18, 2022Updated 3 years ago
- A tool to extract the DEX file from ODEX compiled ahead of time version.☆11Sep 28, 2021Updated 4 years ago
- ☆13Oct 10, 2018Updated 7 years ago
- Universal Malware Sample Encryption☆13Jan 5, 2024Updated 2 years ago
- AI Substitutor is an extension for Burp Suite that uses AI functionality to substitute values of HTTP request parameters and headers.☆27Apr 30, 2025Updated 10 months ago
- ☆15Jun 5, 2019Updated 6 years ago
- Progress of learning kernel development☆14Nov 20, 2022Updated 3 years ago
- ☆19Apr 16, 2025Updated 11 months ago
- Sources Codes of many Office Malwares☆17Sep 4, 2022Updated 3 years ago
- Caido's passive workflow to find potential leaked secrets, PII, and sensitive fields.☆21Jan 13, 2025Updated last year
- Links or additional data to some researches☆14May 24, 2019Updated 6 years ago
- ☆19Dec 1, 2025Updated 3 months ago
- Triton based symbolic emulator☆16Oct 30, 2022Updated 3 years ago