alessandrodd / apk_api_key_extractor
Automatically extracts API Keys from APK files
☆229Updated last year
Related projects: ⓘ
- Mobile penetration testing android & iOS command cheatsheet☆349Updated 10 months ago
- Extract endpoints from APK files☆758Updated 3 months ago
- Script to Bypass SSL/Certificate Pinning in Android☆129Updated 4 years ago
- A tool to automate the boring process of APK recon☆337Updated last year
- The tool is used to analyze the content of the android application in local storage.☆152Updated 8 months ago
- Extract endpoints from apk files.☆862Updated 2 years ago
- ☆135Updated 4 years ago
- ☆97Updated 3 years ago
- Print out URL schemas from an Android app☆110Updated 3 weeks ago
- A simple Python Exploit to Write Data to Insecure/vulnerable firebase databases! Commonly found inside Mobile Apps. If the owner of the a…☆285Updated 3 months ago
- The scripts helps security analsts to identify misconfigured firebase instances.☆198Updated 2 years ago
- A Collection of Android Pentest Learning Materials☆374Updated 3 years ago
- A Colab For Bug Hunting!☆201Updated 3 years ago
- Apkatshu is a Tool for extracting urls , emails , ip address , and interesting data from APK files☆246Updated last year
- An Intentionally designed Vulnerable Android Application built in Kotlin.☆230Updated 2 years ago
- List HackerOne private program assets☆148Updated 3 years ago
- You can read the writeup on this script here☆266Updated 4 years ago
- My Recon Automation☆194Updated 3 years ago
- ☆385Updated 3 years ago
- One-Step APK Decompilation With Multiple Backends☆244Updated 3 years ago
- Burp Extension written in Jython to hunt for common vulnerabilities found in websites. Developed by Gaurav Narwani to help people find vu…☆233Updated 4 years ago
- A scope generation tool for Burp Suite & ZAP☆314Updated last week
- Hunt down the secrets from the WebArchives for Fun and Profit☆165Updated last year
- Created by High-Tech Bridge, the Purposefully Insecure and Vulnerable Android Application (PIVAA) replaces outdated DIVA for benchmark of…☆105Updated 4 years ago
- Trying to make automated recon for bug bounties☆249Updated 3 years ago
- Payloads for CRLF Injection☆210Updated 2 years ago
- An open source Android application that is intentionally vulnerable so as to act as a learning platform for Android application security …☆216Updated 2 years ago
- ☆472Updated this week
- ☆128Updated 3 years ago
- Wordlists, Dictionaries and Other Data Sets for Writing Software Security Test Cases☆328Updated last month