alby77689-design / Wuzen-Framework---Advanced-Mobile-Security-Research-PlatformView external linksLinks
Advanced mobile security research platform for authorized testing and educational purposes
☆13Oct 4, 2025Updated 4 months ago
Alternatives and similar repositories for Wuzen-Framework---Advanced-Mobile-Security-Research-Platform
Users that are interested in Wuzen-Framework---Advanced-Mobile-Security-Research-Platform are comparing it to the libraries listed below
Sorting:
- Repository for all the Technical Talks which I perform during year 2023☆13Dec 14, 2023Updated 2 years ago
- Challenges for ImaginaryCTF 2025☆25Sep 7, 2025Updated 5 months ago
- e2e Scanning research module☆22Jun 30, 2025Updated 7 months ago
- Static-Code-Analysis-Helper helps you perform static code analysis.☆32Jan 2, 2026Updated last month
- google dorks for locate important files, information and accesses☆20Nov 25, 2024Updated last year
- Yet another machine learning-based WAF research☆26Jun 21, 2022Updated 3 years ago
- Metasploit-AI is a cutting-edge cybersecurity framework that combines the power of Metasploit with advanced artificial intelligence and m…☆27Aug 9, 2025Updated 6 months ago
- DoS Attacks on Bluetooth Devices for pentest purposes☆32Nov 22, 2025Updated 2 months ago
- Cobalt Strike is threat emulation software. Red teams and penetration testers use Cobalt Strike to demonstrate the risk of a breach and e…☆16Oct 13, 2022Updated 3 years ago
- CVE-2025-3248 Langflow RCE Exploit☆16Jun 17, 2025Updated 8 months ago
- Creating a Fake WhatsApp Message via SQLite: Understanding the Logic Behind the Manipulation☆36Jul 28, 2025Updated 6 months ago
- ☆19Jul 9, 2021Updated 4 years ago
- HTTP Header Analysis Vulnerability Tool☆14May 6, 2022Updated 3 years ago
- Zerodayf is an advanced code analysis platform that leverages artificial intelligence & SAST to identify vulnerabilities within source co…☆30Nov 16, 2025Updated 3 months ago
- Scripts, POCs & bullshit☆31May 29, 2025Updated 8 months ago
- AutoAR is a comprehensive, modular security automation toolkit designed for bug bounty hunters, penetration testers, and security researc…☆53Feb 2, 2026Updated 2 weeks ago
- 🧰 Various PowerShell scripts for security, sysadmins, blue and red teams👫🏼☆52Aug 28, 2025Updated 5 months ago
- Notes for OSCP & CPTS.☆66Oct 16, 2025Updated 4 months ago
- BurpSuite MCP Server: A powerful Model Context Protocol (MCP) server implementation for BurpSuite, providing programmatic access to Burp…☆71Apr 29, 2025Updated 9 months ago
- NMAP-AI: AI-Powered Network Scanning & Automation Platform 🤖 Revolutionizing network scanning with AI-powered automation, intelli…☆79Aug 16, 2025Updated 6 months ago
- CVE-2025-68613: n8n RCE vulnerability exploit and documentation☆91Dec 23, 2025Updated last month
- Unauthenticated Remote Code Execution via unsafe deserialization in Microsoft SharePoint Server (CVE-2025-53770)☆55Aug 4, 2025Updated 6 months ago
- CVE-2025-49144 PoC for security researchers to test and try.☆85Jun 30, 2025Updated 7 months ago
- This is the repository for indicators of compromise (IOCs) and other data for threat intelligence articles posted on the Palo Alto Networ…☆113Nov 17, 2025Updated 3 months ago
- ☆96Jul 10, 2025Updated 7 months ago
- Youtube as C2 channel - Control Windows systems uploading QR videos to Youtube☆97Jun 24, 2024Updated last year
- A malicious OAuth application that can be leveraged for both internal and external phishing attacks targeting Microsoft Azure and Office3…☆166Jul 31, 2025Updated 6 months ago
- You can get a lifetime of FREE VPS using GitHub Codespaces with Kali Linux Docker image installed on github workspace terminal. (beginner…☆109Sep 30, 2025Updated 4 months ago
- 基于CasaOS容器云构建的渗透测试平台 - A Home Cloud Container Platform Built For Learning Penetration And Network Security☆109Apr 20, 2024Updated last year
- Education-focused MIPS Emulator written in Rust.☆103Jun 20, 2025Updated 7 months ago
- ⚡️ Ethernaut CTF 2024 Challenges & Solutions☆116Mar 18, 2024Updated last year
- A Python http(s) server designed to assist in red teaming activities such as receiving intercepted data via POST requests and serving con…☆137Jul 19, 2024Updated last year
- Remcos Professional Cracked By Alcatraz3222-Remote Administration Trojan-RAT☆122Jul 11, 2024Updated last year
- (DDos-attacker) Tool!☆133Aug 28, 2023Updated 2 years ago
- ☆133Jan 9, 2024Updated 2 years ago
- Advanced SQL Injection Techniques for Bug Bounty Hunters☆143Feb 10, 2025Updated last year
- AWS WAF Solver, full reverse implemented in 100% Python & Golang.☆269Aug 4, 2025Updated 6 months ago
- A cross-platform desktop application for HTTP/HTTPS traffic interception and analysis, built with Go. Features modern UI, traffic manipul…☆219Apr 28, 2025Updated 9 months ago
- Official writeups for Cyber Apocalypse CTF 2025: Tales from Eldoria☆193Apr 1, 2025Updated 10 months ago