amrudesh1 / morf
Mobile Reconnaissance Framework is a powerful, lightweight and platform-independent offensive mobile security tool designed to help hackers and developers identify and address sensitive information within mobile applications.
☆61Updated last week
Alternatives and similar repositories for morf:
Users that are interested in morf are comparing it to the libraries listed below
- Collection of my Security Blueprints & Guides☆45Updated last month
- Burp Suite extension for testing Passkey systems.☆68Updated last month
- This Python-based GUI application allows you to track the latest security vulnerabilities (CVEs) using the☆39Updated last month
- An intentionally vulnerable Android Application to demonstrate various vulnerabilities that airses in Android Components.☆29Updated 3 weeks ago
- AuditForge is a pentest reporting application making it simple and easy to write your findings and generate a customizable report.☆70Updated last week
- ☆59Updated last week
- Bounty Prompt is an Open-Source Burp Suite extension by Bounty Security that leverages advanced AI via Burp AI and Groq AI. It enables us…☆91Updated 2 months ago
- Burp Suite extension for bypassing client-side encryption for pentesting and bug bounty in WebSocket☆74Updated this week
- The perfect butler for pentesters, bug-bounty hunters and security researchers☆90Updated last year
- SignSaboteur is a Burp Suite extension for editing, signing, verifying various signed web tokens☆158Updated 5 months ago
- A simple mutator engine which focuses on finding unknown classes of injection vulnerabilities☆67Updated last year
- frida-codeshare-scripts.collection of useful FRIDA scripts.A curated list of Frida resources.☆70Updated 5 months ago
- FrogPost: postMessage Security Testing Tool☆64Updated this week
- Create tar/zip archives that try to exploit zipslip vulnerability.☆47Updated 7 months ago
- SprayShark is a modular G-Suite password sprayer with threading!☆36Updated 2 weeks ago
- APT Emulation tool to exfiltrate sensitive .docx, .pptx, .xlsx, .pdf files☆81Updated last month
- Weaponized EvilnoVNC: Scalable and semi-automated MFA-Phishing☆46Updated 2 months ago
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆44Updated last year
- NullSection is an Anti-Reversing tool that applies a technique that overwrites the section header with nullbytes.☆65Updated last year
- A tool for generating detailed, locally-processed reports from iOS backups, supporting encrypted and unencrypted data.☆54Updated 6 months ago
- A Powerful Network Reconnaissance Tool for Security Professionals☆100Updated 4 months ago
- External Playbooks for Public Access☆38Updated 3 months ago
- A command-line utility for performing reverse DNS lookups☆70Updated last year
- APK Infrastructure Investigator☆63Updated last year
- LLM tool to find any potential vulnerabilities in android apps and deobfuscate android app code.☆101Updated last month
- Exposor is a tool using internet search engines to detect exposed technologies with a unified syntax.☆56Updated last month
- Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's …☆105Updated last month
- ☆39Updated 9 months ago
- ☆81Updated 9 months ago
- Automated script to convert and push Burp Suite certificate in Android, and modify Android's IP table to redirect all traffic to Burp Sui…☆110Updated 2 years ago