Mobile Reconnaissance Framework is a powerful, lightweight and platform-independent offensive mobile security tool designed to help hackers and developers identify and address sensitive information within mobile applications.
☆78Feb 7, 2026Updated 2 months ago
Alternatives and similar repositories for morf
Users that are interested in morf are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- FirmwareDroid is an analysis framework for Android firmware and Apps.☆28Updated this week
- Efficient DevSecOps☆47Jun 30, 2025Updated 9 months ago
- Tool created for Red Team to test default credentials on SSH and WinRM and then execute scripts with those credentials before the passwor…☆41May 7, 2023Updated 2 years ago
- 🌑 EclipseRecon is a personal project developed during my cybersecurity learning journey 🛡️. It helps practice web reconnaissance 🌐 by …☆29Nov 26, 2025Updated 4 months ago
- Addon for BHCE☆57Apr 1, 2025Updated last year
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A tool for folks who `git clone` first and ask questions later☆67Sep 12, 2025Updated 7 months ago
- This script tampers the apk to inject Facebook Stetho library to inspect app sandbox data on non-rooted device☆41Oct 19, 2020Updated 5 years ago
- Fast and easy to use CLI-based file encryption program 📦☆13Oct 12, 2025Updated 6 months ago
- 🖥️ Windows 🚀 A Windows tool for emergency privacy: instantly deletes sensitive data and active logins to protect my information during …☆54Jan 26, 2026Updated 2 months ago
- IDA helper plugin to reverse engineer Objective-C code☆44Jun 12, 2025Updated 10 months ago
- AuditForge is a pentest reporting application making it simple and easy to write your findings and generate a customizable report.☆78Sep 1, 2025Updated 7 months ago
- AutoPwnKey is a red teaming framework and testing tool using AutoHotKey (AHK), which at the time of creation proves to be quite evasive. …☆111Jul 21, 2025Updated 8 months ago
- Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's …☆133Mar 26, 2025Updated last year
- APK Infrastructure Investigator☆64Jun 20, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- prel(iminary) is an application that temporarily assigns Google Cloud IAM Roles and includes an approval process.☆46Apr 8, 2026Updated last week
- A tool to work with all types of Kerberos delegations (unconstrained, constrained, and resource-based constrained delegations) in Active …☆215Jan 12, 2026Updated 3 months ago
- WPAUDIT: Advanced WordPress security auditing suite & vulnerability scanner. Automates pentesting with Nmap, WPScan, Nuclei, SQLMap. Comp…☆35May 27, 2025Updated 10 months ago
- ☆60Jun 2, 2025Updated 10 months ago
- FrogPost: postMessage Security Testing Tool☆108Dec 4, 2025Updated 4 months ago
- Bypass security checks in IOSSecuritySuite and Rootbear☆53Jul 5, 2023Updated 2 years ago
- 🔥Ready, Aim, Fire.🔥☆18Jun 3, 2022Updated 3 years ago
- Hi, these are some scripts that i use whenever a mobile pentest task comes up . Hope they would be helpful for someone☆13Dec 14, 2023Updated 2 years ago
- Burp Suite extension for testing Passkey systems.☆76Apr 1, 2025Updated last year
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Android 14 Beta 1 framework/services source code, reverse engineered from a Pixel 7 Pro (upb1.230309.014)☆16Apr 13, 2023Updated 3 years ago
- Listener that spawns a new tmux window for each incoming reverse shell + Supports listening on many ports☆61Jul 13, 2025Updated 9 months ago
- OXO is a security scanning orchestrator for the modern age.☆562Updated this week
- 😹 Python project to bruteforce Apache Tomcat manager login with known-default credentials☆99Mar 12, 2024Updated 2 years ago
- 专为蚁剑编写的独立WebShell服务程序☆10Jan 31, 2025Updated last year
- A simple touchID prompt'er for use in shell scripts.☆99Jun 18, 2024Updated last year
- Audit your Node version for known CVEs and patches☆26Aug 20, 2025Updated 7 months ago
- Pentesting tool to automate common op tasks and organize discovered data.☆14Mar 26, 2026Updated 2 weeks ago
- Create tar/zip archives that try to exploit zipslip vulnerability.☆48Sep 20, 2024Updated last year
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆12Aug 10, 2019Updated 6 years ago
- A Python based tool to convert custom queries from Legacy BloodHound to BloodHound CE format, with the option to directly upload them to …☆37Oct 1, 2025Updated 6 months ago
- Stay within program scope☆37Aug 17, 2022Updated 3 years ago
- .NET Post-Exploitation Utility for Abusing Strong Explicit Certificate Mappings in ADCS☆150Feb 10, 2025Updated last year
- A collection of Turbo Intruder scripts.☆71Feb 1, 2025Updated last year
- A semantic-based tool to detect credential leakage in mini-apps.☆18Sep 8, 2024Updated last year
- tool for checking potential dependency confusion☆39Jul 5, 2025Updated 9 months ago