amrudesh1 / morfLinks
Mobile Reconnaissance Framework is a powerful, lightweight and platform-independent offensive mobile security tool designed to help hackers and developers identify and address sensitive information within mobile applications.
☆69Updated 2 weeks ago
Alternatives and similar repositories for morf
Users that are interested in morf are comparing it to the libraries listed below
Sorting:
- ☆61Updated 3 months ago
- This Python-based GUI application allows you to track the latest security vulnerabilities (CVEs) using the☆39Updated 4 months ago
- Burp Suite extension for testing Passkey systems.☆73Updated 4 months ago
- An intentionally vulnerable Android Application to demonstrate various vulnerabilities that airses in Android Components.☆33Updated 3 months ago
- Burp Suite extension for bypassing client-side encryption for pentesting and bug bounty in WebSocket☆80Updated last month
- A simple mutator engine which focuses on finding unknown classes of injection vulnerabilities☆67Updated last year
- Personal collection of exploits and PoCs across Windows, Linux, and enterprise software.☆50Updated 2 weeks ago
- Automated script to convert and push Burp Suite certificate in Android, and modify Android's IP table to redirect all traffic to Burp Sui…☆111Updated 2 years ago
- udpy_proto_scanner is a Python script which discovers UDP services by sending triggers to a list of hosts☆48Updated 2 years ago
- AuditForge is a pentest reporting application making it simple and easy to write your findings and generate a customizable report.☆74Updated last week
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆44Updated last year
- Detect code obfuscation through text classification in the detection process.☆45Updated last year
- SprayShark is a modular G-Suite password sprayer with threading!☆50Updated 2 months ago
- Bounty Prompt is an Open-Source Burp Suite extension by Bounty Security that leverages advanced AI via Burp AI and Groq AI. It enables us…☆97Updated 5 months ago
- A simple tool to allows users to search for and analyze android apps for potential security threats and vulnerabilities☆86Updated last year
- Create tar/zip archives that try to exploit zipslip vulnerability.☆47Updated 10 months ago
- The perfect butler for pentesters, bug-bounty hunters and security researchers☆91Updated last year
- Exposor is a tool using internet search engines to detect exposed technologies with a unified syntax.☆56Updated last month
- Linux post exploitation tool for info gathering and exfiltration 🐧📡💀☆85Updated last week
- Cake Fuzzer is a project that is meant to help automatically and continuously discover vulnerabilities in web applications created based …☆99Updated 2 weeks ago
- The OWApp Benchmark: an OWASP-compliant Vulnerable Android App Dataset☆44Updated 3 months ago
- The SAP Threat Modeling Tool is an on-premises open-source web application designed to analyze and visualize connections between SAP syst…☆49Updated 5 months ago
- Collection of my Security Blueprints & Guides☆51Updated last week
- Repo for all my exploits/PoCs☆51Updated 3 months ago
- Unauthorized Access to Metadata and User Data like CTF☆27Updated 8 months ago
- A Powerful Network Reconnaissance Tool for Security Professionals☆101Updated 7 months ago
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts.☆121Updated last year
- Some of my rough notes for Docker threat detection☆47Updated last year
- A PoC code for JSON Smuggling technique to smuggle arbitrary files through JSON☆113Updated last year
- PfSense Stored XSS lead to Arbitrary Code Execution exploit☆47Updated 6 months ago