aapooksman / privateAPNLinks
Set of tools and documentation for leveraging private APNs for mobile network traffic analysis
☆27Updated last year
Alternatives and similar repositories for privateAPN
Users that are interested in privateAPN are comparing it to the libraries listed below
Sorting:
- A Python-based tool to create zip, tar and cpio archives to exploit common archive library issues and developer mistakes☆43Updated 2 years ago
- DEbian Cve REproducer Tool☆27Updated 4 months ago
- Script for importing Nmap results into a Neo4j Graph Database☆23Updated 6 months ago
- Source code and examples for Antignis☆44Updated 3 years ago
- Provides an overview of the inner file structure of a PDF☆25Updated 3 years ago
- Slide deck for DEF CON 30 - Read Team Village - Offensive Wireless Security presentation☆13Updated 3 years ago
- This is a proof-of-concept of malicious software running inside of ModSecurity WAF.☆34Updated 4 months ago
- ☆16Updated 7 months ago
- Timestomp Tool to flatten MAC times with a specific timestamp☆49Updated 7 months ago
- ☆60Updated 2 years ago
- details about DIAL protocol vulnerabilities☆30Updated 2 years ago
- ☆14Updated last year
- A PoC exploit for CVE-2022-41622 - a CSRF in F5 BIG-IP control plane that leads to remote root☆21Updated 3 years ago
- ☆18Updated last year
- A detailed repository of vulnerabilities that I discovered in The Squid Caching Proxy.☆23Updated last year
- Finding sensitive information in the trimmed parts of cropped images☆29Updated 3 years ago
- Command line fuzzer and bruteforcer 🌪 wfuzz for command☆90Updated 3 years ago
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆11Updated 2 years ago
- A VS Code extension to preview XML nmap output☆44Updated 9 months ago
- This repo contains a list of vendors that hide their security advisories, alerts, notices, vulnerabilities, and more behind either a payw…☆32Updated last year
- Example tools for detecting software using OpenSSL 3.0.0 - 3.0.6 (vulnerable to latest unnamed vulnerability)☆43Updated 3 years ago
- ☆25Updated last year
- ☆22Updated last year
- Database of backdoor passwords used by Malware, uncovered by the Malvuln project.☆25Updated last year
- NullSection is an Anti-Reversing tool that applies a technique that overwrites the section header with nullbytes.☆68Updated last year
- Performs DNS zone dumps by walking DNSSEC NSEC(3) records.☆29Updated 3 years ago
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.☆79Updated 2 years ago
- ThingFinder is a tool designed to facilitate searching and analysing code, whether it's source code or compiled binary executables. It pr…☆38Updated last year
- Custom Binary Ninja Themes☆12Updated 2 years ago
- Automated privilege escalation of the world's most popular Docker images.☆69Updated 2 years ago