amrudesh1 / morfLinks
Mobile Reconnaissance Framework is a powerful, lightweight and platform-independent offensive mobile security tool designed to help hackers and developers identify and address sensitive information within mobile applications.
☆73Updated this week
Alternatives and similar repositories for morf
Users that are interested in morf are comparing it to the libraries listed below
Sorting:
- ☆61Updated 4 months ago
- Burp Suite extension for bypassing client-side encryption for pentesting and bug bounty in WebSocket☆81Updated 3 weeks ago
- An intentionally vulnerable Android Application to demonstrate various vulnerabilities that airses in Android Components.☆36Updated 5 months ago
- Burp Suite extension for testing Passkey systems.☆74Updated 5 months ago
- Detect code obfuscation through text classification in the detection process.☆45Updated last year
- This Python-based GUI application allows you to track the latest security vulnerabilities (CVEs) using the☆39Updated 5 months ago
- frida-codeshare-scripts.collection of useful FRIDA scripts.A curated list of Frida resources.☆89Updated 3 months ago
- Collection of my Security Blueprints & Guides☆51Updated last month
- A simple mutator engine which focuses on finding unknown classes of injection vulnerabilities☆67Updated last year
- Bounty Prompt is an Open-Source Burp Suite extension by Bounty Security that leverages advanced AI via Burp AI and Groq AI. It enables us…☆96Updated 6 months ago
- An archive of 0day.today exploits☆166Updated last month
- The OWApp Benchmark: an OWASP-compliant Vulnerable Android App Dataset☆44Updated 5 months ago
- Automated script to convert and push Burp Suite certificate in Android, and modify Android's IP table to redirect all traffic to Burp Sui…☆111Updated 2 years ago
- Create tar/zip archives that try to exploit zipslip vulnerability.☆48Updated 11 months ago
- The perfect butler for pentesters, bug-bounty hunters and security researchers☆92Updated last year
- Real Android malware apps discussed in the book☆38Updated last year
- Burp extension for Recursive Request Exploits (RRE) — DEFCON 2025☆90Updated last month
- Exposor is a tool using internet search engines to detect exposed technologies with a unified syntax.☆57Updated 2 months ago
- A PoC code for JSON Smuggling technique to smuggle arbitrary files through JSON☆113Updated last year
- SSLPinDetect is a tool for analyzing Android APKs to detect SSL pinning implementations by scanning for known patterns in decompiled code…☆38Updated last week
- Nuclei templates for source code analysis. Detects hardcoded secrets, config leaks, debug endpoints. Also helps identify OWASP Top 10 iss…☆77Updated 3 months ago
- Simple PoC for demonstrating Race Conditions on Websockets☆55Updated 2 years ago
- Cake Fuzzer is a project that is meant to help automatically and continuously discover vulnerabilities in web applications created based …☆104Updated last month
- A complete security assessment tool that supports common web security issues scanning and custom POC | Be sure to read the document befor…☆20Updated 11 months ago
- Unauthorized Access to Metadata and User Data like CTF☆27Updated 9 months ago
- Personal collection of exploits and PoCs across Windows, Linux, and enterprise software.☆50Updated last month
- A tech enumeration toolkit focused on 404 Not found pages.☆25Updated 11 months ago
- APK Infrastructure Investigator☆64Updated 2 years ago
- Deluder is a tool for intercepting traffic of proxy unaware applications. Currently, Deluder supports OpenSSL, GnuTLS, SChannel, WinSock …☆205Updated 11 months ago
- AuditForge is a pentest reporting application making it simple and easy to write your findings and generate a customizable report.☆74Updated 2 weeks ago