A bluetooth-related vulnerability in some contact tracing apps
☆25Jun 26, 2020Updated 5 years ago
Alternatives and similar repositories for COVIDSafe-CVE-2020-12856
Users that are interested in COVIDSafe-CVE-2020-12856 are comparing it to the libraries listed below
Sorting:
- Python implementation of a Bugcrowd api client.☆11Nov 20, 2025Updated 4 months ago
- The Mobile App Pentest cheat sheet was created to provide concise collection of high value information on specific mobile application pen…☆16Apr 11, 2017Updated 8 years ago
- Source for many challenges from DEF CON 21 CTF Finals☆33Apr 3, 2014Updated 11 years ago
- File system enumerator and monitor for Android and Ubuntu.☆17Sep 25, 2021Updated 4 years ago
- finals-2014☆20Nov 15, 2016Updated 9 years ago
- The DetectDynamicJS Burp Extension provides an additional passive scanner that tries to find differing content in JavaScript files and ai…☆13Dec 17, 2018Updated 7 years ago
- Get URLs from the Wayback Machine. Able to handle large outputs.☆35Sep 15, 2023Updated 2 years ago
- Python Script for Spamming Emails with Attachments☆10Jan 4, 2020Updated 6 years ago
- GhostSec Scam Detection Tool☆15Feb 11, 2021Updated 5 years ago
- A list of Information Security firms operating in th Asia-Pacific region, and where student intake opportunities can be found.☆24Oct 30, 2020Updated 5 years ago
- quals-2014☆21Nov 3, 2014Updated 11 years ago
- Powershell SMBv3 Compression checker☆28Apr 1, 2023Updated 2 years ago
- Network Finger Printer☆16Nov 10, 2017Updated 8 years ago
- Tool for viewing Android package details, including permissions, services, activities, and more.☆22Nov 30, 2012Updated 13 years ago
- pycaret-git-actions☆16Aug 6, 2020Updated 5 years ago
- CUPP - Common User Passwords Profiler !☆15Jun 14, 2024Updated last year
- Coleção de informações sobre POS's disponíveis no mercado Brasileiro, com propósito educativo.☆11Sep 6, 2020Updated 5 years ago
- Linux deniable cryptographic storage eraser based on hardware USB trigger for self-destruction in a case of emergency☆12Apr 16, 2020Updated 5 years ago
- Write up for the CyberTalents 2017 qualifications round☆12Apr 13, 2017Updated 8 years ago
- ☆16Dec 2, 2021Updated 4 years ago
- PoCs for CVE-2020-11108; an RCE and priv esc in Pi-hole☆27May 10, 2020Updated 5 years ago
- Some helpful things for AVR☆16Jan 23, 2018Updated 8 years ago
- ☆11Mar 27, 2024Updated last year
- Push notifications for passive DNS data☆111Apr 18, 2016Updated 9 years ago
- UEFI keylogger prototype☆10May 10, 2017Updated 8 years ago
- ☆13Apr 8, 2019Updated 6 years ago
- A simple tool to view important DLL Characteristics and change DEP and ASLR☆45Oct 26, 2018Updated 7 years ago
- Find orphaned IP's on cloud services☆29Oct 23, 2019Updated 6 years ago
- Some guides about general topics on information security☆13Mar 19, 2019Updated 7 years ago
- Files for the Defcon Toronto Introduction to 64-bit Linux Exploitation☆15Feb 23, 2018Updated 8 years ago
- Surgical python tool to assist in LFI discovery☆13Sep 2, 2018Updated 7 years ago
- ☆13Jul 12, 2021Updated 4 years ago
- ☆13Aug 19, 2015Updated 10 years ago
- Notifications when metasploit msf session up or down in telegram.☆11Feb 20, 2018Updated 8 years ago
- Web application recon for bug bounty☆21Apr 19, 2020Updated 5 years ago
- Fork of iSec Partners Android Intent Fuzzer (https://www.isecpartners.com/tools/mobile-security/intent-fuzzer.aspx)☆16Feb 10, 2015Updated 11 years ago
- Some simple scripts for decrypting passwords retrieved from a Manage Engine OpManager installation☆11Jan 28, 2016Updated 10 years ago
- CVE-2020-1048 bypass: binary planting PoC☆33Aug 20, 2020Updated 5 years ago
- Java code for CFS2160 Programming Stream 2019/20☆10Jan 16, 2020Updated 6 years ago