Mobile Reconnaissance Framework is a powerful, lightweight and platform-independent offensive mobile security tool designed to help hackers and developers identify and address sensitive information within mobile applications.
☆79Feb 7, 2026Updated last month
Alternatives and similar repositories for morf
Users that are interested in morf are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Nakamoto is a 2 layer encryption tool to protect your data and your cyptocurrency☆15Nov 13, 2025Updated 4 months ago
- Web Server Vulnerability Scanning Tool☆36Mar 11, 2025Updated last year
- FirmwareDroid is an analysis framework for Android firmware and Apps.☆27Feb 19, 2026Updated last month
- 🌑 EclipseRecon is a personal project developed during my cybersecurity learning journey 🛡️. It helps practice web reconnaissance 🌐 by …☆29Nov 26, 2025Updated 3 months ago
- Addon for BHCE☆58Apr 1, 2025Updated 11 months ago
- A tool for folks who `git clone` first and ask questions later☆67Sep 12, 2025Updated 6 months ago
- This script tampers the apk to inject Facebook Stetho library to inspect app sandbox data on non-rooted device☆41Oct 19, 2020Updated 5 years ago
- ☆52Dec 20, 2025Updated 3 months ago
- Fast and easy to use CLI-based file encryption program 📦☆13Oct 12, 2025Updated 5 months ago
- IDA helper plugin to reverse engineer Objective-C code☆44Jun 12, 2025Updated 9 months ago
- AuditForge is a pentest reporting application making it simple and easy to write your findings and generate a customizable report.☆79Sep 1, 2025Updated 6 months ago
- AutoPwnKey is a red teaming framework and testing tool using AutoHotKey (AHK), which at the time of creation proves to be quite evasive. …☆110Jul 21, 2025Updated 8 months ago
- Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's …☆132Mar 26, 2025Updated 11 months ago
- APK Infrastructure Investigator☆64Jun 20, 2023Updated 2 years ago
- A C++ tool for process memory scanning & suspicious telemetry generation that attempts to detect a number of malicious techniques used by…☆87May 13, 2024Updated last year
- prel(iminary) is an application that temporarily assigns Google Cloud IAM Roles and includes an approval process.☆46Mar 16, 2026Updated last week
- A tool to work with all types of Kerberos delegations (unconstrained, constrained, and resource-based constrained delegations) in Active …☆215Jan 12, 2026Updated 2 months ago
- ☆60Jun 2, 2025Updated 9 months ago
- FrogPost: postMessage Security Testing Tool☆108Dec 4, 2025Updated 3 months ago
- A data pool-aware static analyzer to detect cross-layer threats in Android apps.☆13Jan 31, 2024Updated 2 years ago
- Bypass security checks in IOSSecuritySuite and Rootbear☆53Jul 5, 2023Updated 2 years ago
- 🔥Ready, Aim, Fire.🔥☆18Jun 3, 2022Updated 3 years ago
- .NET tool used to enrich RPC telemetry☆101Jan 24, 2026Updated 2 months ago
- Hi, these are some scripts that i use whenever a mobile pentest task comes up . Hope they would be helpful for someone☆13Dec 14, 2023Updated 2 years ago
- Burp Suite extension for testing Passkey systems.☆75Apr 1, 2025Updated 11 months ago
- Android 14 Beta 1 framework/services source code, reverse engineered from a Pixel 7 Pro (upb1.230309.014)☆17Apr 13, 2023Updated 2 years ago
- Multilingual library made for validation, various form fields, such as: email, telephone, password, cpf, cnpj, credit card, magic numbers…☆19Feb 15, 2025Updated last year
- Listener that spawns a new tmux window for each incoming reverse shell + Supports listening on many ports☆60Jul 13, 2025Updated 8 months ago
- OXO is a security scanning orchestrator for the modern age.☆563Updated this week
- 😹 Python project to bruteforce Apache Tomcat manager login with known-default credentials☆99Mar 12, 2024Updated 2 years ago
- Find what egress ports are allowed☆46Nov 19, 2025Updated 4 months ago
- 专为蚁剑编写的独立WebShell服务程序☆10Jan 31, 2025Updated last year
- A simple touchID prompt'er for use in shell scripts.☆99Jun 18, 2024Updated last year
- A burp for intents wannabe☆80Jul 29, 2024Updated last year
- Pentesting tool to automate common op tasks and organize discovered data.☆14Mar 13, 2026Updated last week
- Create tar/zip archives that try to exploit zipslip vulnerability.☆48Sep 20, 2024Updated last year
- A Python based tool to convert custom queries from Legacy BloodHound to BloodHound CE format, with the option to directly upload them to …☆37Oct 1, 2025Updated 5 months ago
- Stay within program scope☆37Aug 17, 2022Updated 3 years ago
- .NET Post-Exploitation Utility for Abusing Strong Explicit Certificate Mappings in ADCS☆150Feb 10, 2025Updated last year