alterakey / trueseeingView external linksLinks
Non-decompiling iOS/Android app vulnerability scanner (DC25 demo lab, CB17)
☆66Dec 2, 2025Updated 2 months ago
Alternatives and similar repositories for trueseeing
Users that are interested in trueseeing are comparing it to the libraries listed below
Sorting:
- How to install google play manually on any android devices☆12Jan 30, 2020Updated 6 years ago
- Agrigento is a tool to identify privacy leaks in Android apps by performing black-box differential analysis on the network traffic.☆72Oct 1, 2020Updated 5 years ago
- ☆13Jan 6, 2020Updated 6 years ago
- Check for know iframeBuster XSS☆12Sep 25, 2024Updated last year
- ☆10Mar 4, 2018Updated 7 years ago
- Custom Search Engine in Node.js with Google APIs☆12Feb 6, 2020Updated 6 years ago
- Telco training☆26Oct 17, 2018Updated 7 years ago
- Automatically extracts API Keys from APK files☆13Feb 1, 2022Updated 4 years ago
- API for data collection in twitter. Developed as part of a bot detection project.☆12Oct 28, 2018Updated 7 years ago
- Privilege escalation challenges created for Harmonie-Technologie exhibition stand @ NDH16 (Paris)☆15Dec 26, 2019Updated 6 years ago
- An open source Android application that is intentionally vulnerable so as to act as a learning platform for Android application security …☆223Dec 23, 2021Updated 4 years ago
- Kernel Code for Portal.☆13Apr 9, 2022Updated 3 years ago
- ☆15Sep 24, 2015Updated 10 years ago
- CAs that are in the graph of trust☆13Oct 22, 2019Updated 6 years ago
- 🌐 Devploit v 2.3 Information Gathering Tool🕵️☆17Apr 28, 2018Updated 7 years ago
- ☆21Dec 24, 2018Updated 7 years ago
- Tool for reversing AAPT by remapping R.java values after decompilation/deobfuscation.☆33Mar 5, 2018Updated 7 years ago
- A demo app vulnerable to directory traversal☆15May 3, 2020Updated 5 years ago
- FirePrint is a security tool for finding misconfigured Firebase realtime databases in Android or iOS applications.☆22Apr 4, 2024Updated last year
- Static code search python lib☆18Oct 27, 2020Updated 5 years ago
- Ccollection of Linux loadable kernel modules aimed to logs any user action☆27Mar 25, 2019Updated 6 years ago
- My slides☆89Nov 4, 2019Updated 6 years ago
- ☆175Aug 16, 2021Updated 4 years ago
- XXE vulnerability demo☆22Jun 1, 2014Updated 11 years ago
- Proof-of-concept malware programs. For educational purpose only.☆23Sep 19, 2016Updated 9 years ago
- A very minimalist smali emulator that could be used to "decrypt" obfuscated strings☆104Jul 12, 2017Updated 8 years ago
- GitHub Actions for MobSF☆26Apr 24, 2024Updated last year
- A tool for automatic data loading from AppMetrica LogsAPI into (local) ClickHouse☆25Dec 8, 2022Updated 3 years ago
- Android App Security Checklist☆891Aug 27, 2022Updated 3 years ago
- Mobile security trainings based on android☆108Nov 12, 2020Updated 5 years ago
- JNI method enumeration in ELF files☆50Jan 8, 2016Updated 10 years ago
- Burp Extension to manipulate AES encrypted payloads☆24Aug 2, 2017Updated 8 years ago
- Simple website to display the LAN status based on a nmap scan☆58Jan 5, 2023Updated 3 years ago
- ☆352Aug 29, 2024Updated last year
- ☆43Feb 20, 2016Updated 9 years ago
- Tool used for dumping memory from Android devices☆70Jun 12, 2015Updated 10 years ago
- Vuldroid is a Vulnerable Android Application made with security issues in order to demonstrate how they can occur in code☆66Sep 18, 2021Updated 4 years ago
- [Official] Android reverse engineering tool focused on dynamic instrumentation automation leveraging Frida. It disassembles dex, analyzes…☆1,123Feb 2, 2023Updated 3 years ago
- An automated wrapper script for patching iOS applications (IPA files) and work on non-jailbroken device☆121Oct 6, 2017Updated 8 years ago