aapooksman / privateAPNLinks
Set of tools and documentation for leveraging private APNs for mobile network traffic analysis
☆24Updated 10 months ago
Alternatives and similar repositories for privateAPN
Users that are interested in privateAPN are comparing it to the libraries listed below
Sorting:
- This is a proof-of-concept of malicious software running inside of ModSecurity WAF.☆33Updated 3 years ago
- A Python-based tool to create zip, tar and cpio archives to exploit common archive library issues and developer mistakes☆43Updated last year
- Finding sensitive information in the trimmed parts of cropped images☆30Updated 3 years ago
- Provides an overview of the inner file structure of a PDF☆25Updated 2 years ago
- pwncat module that automatically exploits CVE-2021-4034 (pwnkit)☆32Updated 3 years ago
- DEbian Cve REproducer Tool☆25Updated 3 weeks ago
- ThingFinder is a tool designed to facilitate searching and analysing code, whether it's source code or compiled binary executables. It pr…☆38Updated last year
- details about DIAL protocol vulnerabilities☆28Updated last year
- ☆55Updated 9 months ago
- Source code and examples for Antignis☆43Updated 2 years ago
- Database of backdoor passwords used by Malware, uncovered by the Malvuln project.☆26Updated 8 months ago
- Alpine hostapd-mana based RADIUS server☆10Updated 2 years ago
- Command line fuzzer and bruteforcer 🌪 wfuzz for command☆86Updated 2 years ago
- 🎥 Spytruder: Advanced RTSP Camera Discovery and Vulnerability Assessment Tool☆15Updated this week
- ☆20Updated last year
- ☆10Updated 4 years ago
- Tools for offensive security of NetBackup infrastructures☆41Updated 2 years ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆20Updated 3 years ago
- DIT is a DTLS MitM proxy implemented in Python 3. It can intercept, manipulate and suppress datagrams between two DTLS endpoints and supp…☆58Updated 3 years ago
- self-hosted Azure OSINT tool☆31Updated 2 weeks ago
- A detailed repository of vulnerabilities that I discovered in The Squid Caching Proxy.☆22Updated 8 months ago
- Timestomp Tool to flatten MAC times with a specific timestamp☆47Updated 2 months ago
- ☆16Updated 5 months ago
- Autopsy Module to analyze Registry Hives☆15Updated 3 years ago
- A PoC exploit for CVE-2022-41622 - a CSRF in F5 BIG-IP control plane that leads to remote root☆21Updated 2 years ago
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.☆77Updated last year
- Left To My Own Devices - NT hash tools☆33Updated 2 years ago
- A simple tool to create mermaid js markdown charts from CVE IDs and CVE keyword searches.☆43Updated 2 years ago
- Script for importing Nmap results into a Neo4j Graph Database☆23Updated 2 months ago
- ☆25Updated last year