aapooksman / privateAPN
Set of tools and documentation for leveraging private APNs for mobile network traffic analysis
☆19Updated 2 months ago
Related projects ⓘ
Alternatives and complementary repositories for privateAPN
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆18Updated 3 years ago
- This is a proof-of-concept of malicious software running inside of ModSecurity WAF.☆31Updated 2 years ago
- ☆24Updated 10 months ago
- Use WordPress pingback.ping to transfer files.☆16Updated 8 months ago
- self-hosted Azure OSINT tool☆23Updated 2 months ago
- ☆18Updated last month
- Timestomp Tool to flatten MAC times with a specific timestamp☆45Updated last year
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆29Updated 5 months ago
- CVE-2013-4786 Go exploitation tool☆37Updated last year
- Provides an overview of the inner file structure of a PDF☆24Updated 2 years ago
- ☆17Updated 2 years ago
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆10Updated last year
- NullSection is an Anti-Reversing tool that applies a technique that overwrites the section header with nullbytes.☆62Updated 10 months ago
- SSH Private Key Looting Wordlists. A collection of wordlists to aid in locating or brute-forcing SSH private key file names.☆35Updated 9 months ago
- ☆14Updated 3 years ago
- ☆50Updated 7 months ago
- ☆17Updated last year
- A Python-based tool to create zip, tar and cpio archives to exploit common archive library issues and developer mistakes☆42Updated last year
- DEbian Cve REproducer Tool☆22Updated last year
- A collection of tools using OCR to extract potential usernames from RDP screenshots.☆28Updated 7 months ago
- CVE-2024-23108: Fortinet FortiSIEM Unauthenticated 2nd Order Command Injection☆31Updated 6 months ago
- details about DIAL protocol vulnerabilities☆27Updated last year
- Dump Kerberos tickets from the KCM database of SSSD☆49Updated 2 months ago
- Cisco CallManager User Enumeration☆15Updated 2 years ago
- Leverages B64 chunks to split files and save to clipboard☆24Updated 5 months ago
- ☆17Updated last week
- ☆34Updated 8 months ago
- Use the GCP testIamPermissions functionality to bruteforce and discover your permissions☆21Updated 2 months ago