Android app to bypass SSL certificate validation (Certificate Pinning).
☆16Feb 7, 2016Updated 10 years ago
Alternatives and similar repositories for SSLUnpinning_Cydia
Users that are interested in SSLUnpinning_Cydia are comparing it to the libraries listed below
Sorting:
- A Burp Suite extension that checks if a particular URL responds differently to various User-Agent headers☆15Sep 4, 2014Updated 11 years ago
- ☆30Sep 1, 2022Updated 3 years ago
- exploit dev. stuff☆20Aug 7, 2012Updated 13 years ago
- Some helper tools for network pentest☆20Oct 2, 2013Updated 12 years ago
- Using CVE-2013-6282 to bypass Samsung kernel module authentication☆13Dec 21, 2013Updated 12 years ago
- Vulnerable Windows Driver with exploits which were used for demonstration purposes on Hunting and exploiting bugs in kernel drivers prese…☆13Jan 29, 2013Updated 13 years ago
- Small util to dump the IDT table of a running OS X system with kmem enabled☆21May 5, 2014Updated 11 years ago
- Parse HTTP Security Headers☆40Sep 12, 2024Updated last year
- Kernel-level emulation of rdtsc for Mac OS X☆16Mar 15, 2015Updated 10 years ago
- Cross-site request forgery Learning Platform☆21Sep 13, 2014Updated 11 years ago
- This is a SOAP service written in C# that has intentional SQL injection vulnerabilties.☆21Nov 27, 2016Updated 9 years ago
- Patch kextd using radare2☆16Apr 10, 2015Updated 10 years ago
- Collection of IDA Pro plugins I wrote over the years☆24May 8, 2010Updated 15 years ago
- Early exploration in a clang plugin for checking Cocoa KVC/KVO key paths☆71May 26, 2014Updated 11 years ago
- Automating SQL injection using Burp Proxy Logs and SQLMap☆27Jul 6, 2012Updated 13 years ago
- This is an automatic SQL Injection tool called as FatCat , Use of FatCat for testing your web application and exploit your application m…☆18Oct 22, 2015Updated 10 years ago
- Faraday Workspaces for Bug Bounties☆21Jan 19, 2016Updated 10 years ago
- ☆23Aug 28, 2014Updated 11 years ago
- Educational Exploitable Web Application☆24Feb 9, 2016Updated 10 years ago
- IDA plugin to extract Mach-O binaries located in the disassembly or data☆60Jun 15, 2019Updated 6 years ago
- Lightweight version of xpwntool just for decrypting IMG3 firmware files☆46Jan 11, 2021Updated 5 years ago
- Study about HQL injection exploitation.☆51May 15, 2016Updated 9 years ago
- Automated install process for Phishing Frenzy☆24Dec 1, 2014Updated 11 years ago
- CSRF Scanner Extension for Burp Suite Pro☆20Jun 5, 2018Updated 7 years ago
- RoR / Devise PoC in memory Backdoor☆29Dec 14, 2014Updated 11 years ago
- [DEPRECATED] Hiccup is a framework that allows the Burp Suite (a web application security testing tool, http://portswigger.net/burp/) to …☆42Jan 2, 2019Updated 7 years ago
- proof of concept to backdoor files from owncloud encryption module☆17Mar 26, 2016Updated 9 years ago
- XSSing Your Way to Shell☆32Nov 17, 2015Updated 10 years ago
- A general-purpose, easy-to-use fuzzer with interesting analysis options. Supports feedback-driven code coverage modes.☆23Dec 5, 2017Updated 8 years ago
- OSX Security Compliance & Hardening☆47Aug 13, 2015Updated 10 years ago
- Uncategorized utilities☆55Jan 5, 2019Updated 7 years ago
- This module is used to exploit startup script execution through Windows Group Policy settings when configured to run off of a remote SMB …☆22Feb 6, 2020Updated 6 years ago
- IDA AArch64 processor extender extension: Adding crypto extension instructions (AES/SHA1/SHA256)☆24Nov 26, 2016Updated 9 years ago
- Updated version of SWFIntruder☆27Aug 16, 2016Updated 9 years ago
- A Custom Scanner for Burp☆31Mar 26, 2014Updated 11 years ago
- Common Industrial Protocol based device scanner over the internet☆24Mar 10, 2016Updated 9 years ago
- ☆26Jan 18, 2026Updated last month
- ☆25Aug 10, 2018Updated 7 years ago
- A fuzzing script for MitmProxy☆24May 15, 2015Updated 10 years ago