Advanced mobile security research platform for authorized testing and educational purposes
☆13Oct 4, 2025Updated 5 months ago
Alternatives and similar repositories for Wuzen-Framework---Advanced-Mobile-Security-Research-Platform
Users that are interested in Wuzen-Framework---Advanced-Mobile-Security-Research-Platform are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Metasploit-AI is a cutting-edge cybersecurity framework that combines the power of Metasploit with advanced artificial intelligence and m…☆50Aug 9, 2025Updated 7 months ago
- Repository for all the Technical Talks which I perform during year 2023☆12Dec 14, 2023Updated 2 years ago
- Lightweight BApp that seamlessly integrates powerful LLM-scanning capabilities into Burp's built-in Scanner with improved accuracy. Suppo…☆37Aug 4, 2025Updated 7 months ago
- Yet another machine learning-based WAF research☆26Jun 21, 2022Updated 3 years ago
- Static-Code-Analysis-Helper helps you perform static code analysis.☆32Feb 20, 2026Updated last month
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Cobalt Strike is threat emulation software. Red teams and penetration testers use Cobalt Strike to demonstrate the risk of a breach and e…☆16Oct 13, 2022Updated 3 years ago
- e2e Scanning research module☆24Updated this week
- HTTP Header Analysis Vulnerability Tool☆14May 6, 2022Updated 3 years ago
- Challenges for ImaginaryCTF 2025☆25Sep 7, 2025Updated 6 months ago
- CVE-2025-3248 Langflow RCE Exploit☆17Jun 17, 2025Updated 9 months ago
- Just "Harmless" Google dorks for bug hunters☆22Nov 25, 2024Updated last year
- ☆19Jul 9, 2021Updated 4 years ago
- Creating a Fake WhatsApp Message via SQLite: Understanding the Logic Behind the Manipulation☆38Jul 28, 2025Updated 8 months ago
- DoS Attacks on Bluetooth Devices for pentest purposes☆33Nov 22, 2025Updated 4 months ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Zerodayf is an advanced code analysis platform that leverages artificial intelligence & SAST to identify vulnerabilities within source co…☆31Nov 16, 2025Updated 4 months ago
- Scripts, POCs & bullshit☆31May 29, 2025Updated 10 months ago
- AutoAR is an automated security reconnaissance tool and Discord bot for bug bounty hunters and penetration testers. It automates gatherin…☆58Mar 21, 2026Updated last week
- 🧰 Various PowerShell scripts for security, sysadmins, blue and red teams👫🏼☆54Aug 28, 2025Updated 7 months ago
- Youtube as C2 channel - Control Windows systems uploading QR videos to Youtube☆98Jun 24, 2024Updated last year
- A Python http(s) server designed to assist in red teaming activities such as receiving intercepted data via POST requests and serving con…☆137Jul 19, 2024Updated last year
- BurpSuite MCP Server: A powerful Model Context Protocol (MCP) server implementation for BurpSuite, providing programmatic access to Burp…☆74Apr 29, 2025Updated 11 months ago
- Notes for OSCP & CPTS.☆77Updated this week
- NMAP-AI: AI-Powered Network Scanning & Automation Platform 🤖 Revolutionizing network scanning with AI-powered automation, intelli…☆90Feb 14, 2026Updated last month
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- 基于CasaOS容器云构建的渗透测试平台 - A Home Cloud Container Platform Built For Learning Penetration And Network Security☆112Apr 20, 2024Updated last year
- CVE-2025-49144 PoC for security researchers to test and try.☆86Jun 30, 2025Updated 8 months ago
- CVE-2025-68613: n8n RCE vulnerability exploit and documentation☆93Dec 23, 2025Updated 3 months ago
- Unauthenticated Remote Code Execution via unsafe deserialization in Microsoft SharePoint Server (CVE-2025-53770)☆55Aug 4, 2025Updated 7 months ago
- ☆97Jul 10, 2025Updated 8 months ago
- This is the repository for indicators of compromise (IOCs) and other data for threat intelligence articles posted on the Palo Alto Networ…☆115Nov 17, 2025Updated 4 months ago
- (DDos-attacker) Tool!☆140Aug 28, 2023Updated 2 years ago
- ☆136Jan 9, 2024Updated 2 years ago
- This tool allows one to recover old RDP (mstsc) session information in the form of broken PNG files. These PNG files allows Red Team memb…☆222Aug 4, 2018Updated 7 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- A malicious OAuth application that can be leveraged for both internal and external phishing attacks targeting Microsoft Azure and Office3…☆169Jul 31, 2025Updated 7 months ago
- Remcos Professional Cracked By Alcatraz3222-Remote Administration Trojan-RAT☆122Jul 11, 2024Updated last year
- B2K4 - New Facebook OLD Id Cloner Tool | 2003-2011 Facebook Account Cloner | Custom Cloner Maker | Number + UID Cloner | Crack From Frie…☆233Nov 8, 2022Updated 3 years ago
- You can get a lifetime of FREE VPS using GitHub Codespaces with Kali Linux Docker image installed on github workspace terminal. (beginner…☆114Sep 30, 2025Updated 6 months ago
- ⚡️ Ethernaut CTF 2024 Challenges & Solutions☆117Mar 18, 2024Updated 2 years ago
- Education-focused MIPS Emulator written in Rust.☆104Jun 20, 2025Updated 9 months ago
- All-in-one offensive security toolbox with AI agent and MCP architecture. Integrates tools like Nmap, Metasploit, FFUF, SQLMap. Enables p…☆654Jun 5, 2025Updated 9 months ago