Advanced mobile security research platform for authorized testing and educational purposes
☆13Oct 4, 2025Updated 6 months ago
Alternatives and similar repositories for Wuzen-Framework---Advanced-Mobile-Security-Research-Platform
Users that are interested in Wuzen-Framework---Advanced-Mobile-Security-Research-Platform are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Metasploit-AI is a cutting-edge cybersecurity framework that combines the power of Metasploit with advanced artificial intelligence and m…☆51Aug 9, 2025Updated 8 months ago
- Repository for all the Technical Talks which I perform during year 2023☆12Dec 14, 2023Updated 2 years ago
- ☆11Apr 9, 2023Updated 3 years ago
- Lightweight BApp that seamlessly integrates powerful LLM-scanning capabilities into Burp's built-in Scanner with improved accuracy. Suppo…☆38Aug 4, 2025Updated 8 months ago
- Yet another machine learning-based WAF research☆26Jun 21, 2022Updated 3 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Static-Code-Analysis-Helper helps you perform static code analysis.☆32Feb 20, 2026Updated last month
- Dynamic showcase of your work with a multi-language portfolio page featuring responsive design, dark mode, and an engaging user experienc…☆23Sep 16, 2025Updated 7 months ago
- Cobalt Strike is threat emulation software. Red teams and penetration testers use Cobalt Strike to demonstrate the risk of a breach and e…☆16Oct 13, 2022Updated 3 years ago
- e2e Scanning research module☆25Mar 26, 2026Updated 3 weeks ago
- HTTP Header Analysis Vulnerability Tool☆14May 6, 2022Updated 3 years ago
- Challenges for ImaginaryCTF 2025☆25Sep 7, 2025Updated 7 months ago
- CVE-2025-3248 Langflow RCE Exploit☆17Jun 17, 2025Updated 10 months ago
- Just "Harmless" Google dorks for bug hunters☆22Nov 25, 2024Updated last year
- An SSH tunnel management service built with Go☆103Mar 7, 2026Updated last month
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ☆19Jul 9, 2021Updated 4 years ago
- Creating a Fake WhatsApp Message via SQLite: Understanding the Logic Behind the Manipulation☆40Jul 28, 2025Updated 8 months ago
- DoS Attacks on Bluetooth Devices for pentest purposes☆33Nov 22, 2025Updated 4 months ago
- A simple CLI to send nostr events☆29Jul 4, 2024Updated last year
- Zerodayf is an advanced code analysis platform that leverages artificial intelligence & SAST to identify vulnerabilities within source co…☆31Nov 16, 2025Updated 5 months ago
- Scripts, POCs & bullshit☆31May 29, 2025Updated 10 months ago
- AutoAR is an automated security reconnaissance tool, ASM and Discord bot for bug bounty hunters and penetration testers. It automates gat…☆67Updated this week
- 🧰 Various PowerShell scripts for security, sysadmins, blue and red teams👫🏼☆55Apr 9, 2026Updated last week
- Youtube as C2 channel - Control Windows systems uploading QR videos to Youtube☆102Jun 24, 2024Updated last year
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A Python http(s) server designed to assist in red teaming activities such as receiving intercepted data via POST requests and serving con…☆138Jul 19, 2024Updated last year
- BurpSuite MCP Server: A powerful Model Context Protocol (MCP) server implementation for BurpSuite, providing programmatic access to Burp…☆74Apr 29, 2025Updated 11 months ago
- NMAP-AI: AI-Powered Network Scanning & Automation Platform 🤖 Revolutionizing network scanning with AI-powered automation, intelli…☆92Feb 14, 2026Updated 2 months ago
- Notes for OSCP & CPTS.☆81Apr 11, 2026Updated last week
- 基于CasaOS容器云构建的渗透测试平台 - A Home Cloud Container Platform Built For Learning Penetration And Network Security☆111Apr 20, 2024Updated last year
- CVE-2025-49144 PoC for security researchers to test and try.☆86Jun 30, 2025Updated 9 months ago
- CVE-2025-68613: n8n RCE vulnerability exploit and documentation☆93Dec 23, 2025Updated 3 months ago
- Unauthenticated Remote Code Execution via unsafe deserialization in Microsoft SharePoint Server (CVE-2025-53770)☆56Aug 4, 2025Updated 8 months ago
- ☆97Jul 10, 2025Updated 9 months ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- This is the repository for indicators of compromise (IOCs) and other data for threat intelligence articles posted on the Palo Alto Networ…☆116Nov 17, 2025Updated 5 months ago
- (DDos-attacker) Tool!☆140Aug 28, 2023Updated 2 years ago
- ☆138Jan 9, 2024Updated 2 years ago
- This tool allows one to recover old RDP (mstsc) session information in the form of broken PNG files. These PNG files allows Red Team memb…☆221Aug 4, 2018Updated 7 years ago
- A malicious OAuth application that can be leveraged for both internal and external phishing attacks targeting Microsoft Azure and Office3…☆173Jul 31, 2025Updated 8 months ago
- Remcos Professional Cracked By Alcatraz3222-Remote Administration Trojan-RAT☆122Jul 11, 2024Updated last year
- Advanced DNS tunneling VPN for censorship bypass, optimized beyond DNSTT and SlipStream with low-overhead ARQ, resolver load balancing, h…☆644Updated this week