Scripts to set up your own Android 📱 app hacking lab
☆98Jul 12, 2024Updated last year
Alternatives and similar repositories for MobSleuth
Users that are interested in MobSleuth are comparing it to the libraries listed below
Sorting:
- SNMP Bash Script to discover valid community strings, dump basic information, check for write permission and check for RCE.☆11Apr 27, 2024Updated last year
- Subdomains wordlist generted from subdomains of public bug bounty programs☆11Mar 25, 2025Updated 11 months ago
- The utility aims to clean up output generated by popular tools by calculating a hash based on specific JSON values to removing junk data.☆16Apr 5, 2024Updated last year
- 一个用于修改右键插件菜单层级的Burpsuite插件。A simple BurpSuite extension to change extension context menu level.☆14Jan 15, 2024Updated 2 years ago
- ☆13Dec 21, 2023Updated 2 years ago
- Burp Suite extension that enhances Burp Active Scan by adding template engine specific SSTI payloads.☆24Feb 20, 2024Updated 2 years ago
- Automatic SQL injection and database takeover tool☆45Nov 27, 2025Updated 3 months ago
- exfiltration/infiltration toolkit☆23Dec 20, 2023Updated 2 years ago
- JSNotify is a Python script designed to monitor JavaScript files in a specified directory for changes. This tool can be used by developer…☆18Nov 15, 2023Updated 2 years ago
- Python tool to compare and analyse Nmap XML files to create a spreadsheet with results. Can also be used to create a markdown report usin…☆24Nov 12, 2024Updated last year
- A basic tool to check for XSS vulnerabilities. It takes a list of URLs and checks if the parameter values appear in the response.☆30Jul 30, 2024Updated last year
- Burp extension used to snip any header from all the requests.☆23Nov 12, 2023Updated 2 years ago
- Remove duplicate URLs by retaining only the unique combinations of hostname, path, and parameter names☆39May 5, 2024Updated last year
- ☆20Jan 9, 2024Updated 2 years ago
- Mine URLs from Browser's Heap Snapshot for fun and profit☆64Aug 9, 2023Updated 2 years ago
- Hacking: The Art of Exploitation 2nd Edition, by Jon Erickson☆21Mar 24, 2020Updated 5 years ago
- DomainTrail is a fast subdomain enumeration tool that uses effective passive and active techniques.☆41Apr 18, 2024Updated last year
- A demo PHP application used to exercise SQL injection techniques in a safe, local Docker environment☆45Jun 3, 2024Updated last year
- Work in progress experiments with reverse shells, AV bypass and extraction of secrets from memory in C☆39Dec 7, 2019Updated 6 years ago
- How to Hack an Android Phone using an Malicious Android Application - Part-2 (More Sophisticated Way)☆11Oct 26, 2021Updated 4 years ago
- Monitor your study sessions, log your study hours, set goals, and watch your productivity progress.☆10May 19, 2024Updated last year
- Tool for bypassing logins vulnerable against SQL injection☆46Apr 3, 2024Updated last year
- Detect code obfuscation through text classification in the detection process.☆46Feb 7, 2024Updated 2 years ago
- Weaponize Your Burp is a repository for automation your Bug Bounty Hunting mindset in Burp Suite☆80Jan 13, 2023Updated 3 years ago
- A simple utility to perform reverse WHOIS lookups using whoisxml API☆45Aug 9, 2023Updated 2 years ago
- Finds graphql queries in javascript files☆69May 18, 2024Updated last year
- A Lightning-Fast DNS Resolver written in Rust 🦀☆69Nov 19, 2024Updated last year
- Microsoft Outlook Information Disclosure Vulnerability (leak password hash) - Expect Script POC☆43Jan 30, 2024Updated 2 years ago
- aiohttp LFI (CVE-2024-23334)☆27Mar 19, 2024Updated last year
- LogSnare: A playground for testing, preventing, and logging IDOR vulnerabilities.☆33Mar 4, 2024Updated 2 years ago
- This is a Burp Suite extension that allows users to easily add web addresses to the Burp Suite scope.☆97Jan 2, 2025Updated last year
- Self-hosted passive subdomain continous monitoring tool.☆172Jan 30, 2024Updated 2 years ago
- SSH & FTP brute-forcing tool written in python☆11Oct 2, 2024Updated last year
- powerfull pentesting tool to checking email by smtp command☆10Feb 29, 2024Updated 2 years ago
- Exploit ConnectWise ScreenConnect (bypass authentication)☆13Feb 21, 2024Updated 2 years ago
- 🔍LeakScanner - Inspired by Gitleaks☆13Aug 23, 2024Updated last year
- A tool that adds reproducible UUIDs to YARA rules☆13Apr 24, 2024Updated last year
- Dependency Confusion Security Testing Tool☆50Jul 21, 2022Updated 3 years ago
- MS Graph Commands and Tools for Blue Teamers☆51Feb 4, 2026Updated last month