A Unified Platform for Evaluating SAST Tools for Android
☆20Mar 30, 2025Updated 11 months ago
Alternatives and similar repositories for VulsTotal
Users that are interested in VulsTotal are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- AUSERA: Automated Security Vulnerability Detection for Android Apps☆32Oct 29, 2024Updated last year
- Automated Accessibility Issue Detection for Android Apps☆25Oct 29, 2024Updated last year
- Automated Storyboard Generation for Android Apps☆37Oct 29, 2024Updated last year
- ☆15Feb 21, 2022Updated 4 years ago
- Anonymous repo for USCHunt, a tool for detecting and classifying upgradeable proxy smart contracts, built atop Slither☆22Apr 2, 2023Updated 2 years ago
- ☆40Mar 13, 2026Updated last week
- ☆18Oct 20, 2020Updated 5 years ago
- Reverse engineering CTFs.☆68Jan 25, 2026Updated last month
- Triggering and Analyzing Android Kernel Vulnerability CVE-2019-2215☆66Sep 4, 2022Updated 3 years ago
- Android deeplink misconfiguration detector and exploitation tool☆72Feb 22, 2026Updated last month
- 🔗 Source for the Caido plugin store☆16Mar 13, 2026Updated last week
- Android Vulnerability Reports and POCs.☆27Feb 9, 2017Updated 9 years ago
- Exploit for setuid() vulnerability in Android Zygote☆25Mar 16, 2011Updated 15 years ago
- A tool to speed up Android pentesting by automating the APK acquisition and information gathering☆18Jul 6, 2022Updated 3 years ago
- Detect SELFDESTRUCT opcodes in EVM runtime bytecode☆22Jan 14, 2023Updated 3 years ago
- Android Jiagu unpacker - Automated DEX extraction and restoration from obfuscated APKs☆31Oct 29, 2025Updated 4 months ago
- ☆74Nov 28, 2025Updated 3 months ago
- TCP Port Redirection Utility☆19Nov 30, 2023Updated 2 years ago
- Non-decompiling iOS/Android app vulnerability scanner (DC25 demo lab, CB17)☆66Dec 2, 2025Updated 3 months ago
- ☆15Mar 30, 2025Updated 11 months ago
- Framework model for static analysis of Android☆46Jul 13, 2016Updated 9 years ago
- ☆13Mar 13, 2024Updated 2 years ago
- The Faction Burp Suite Extension☆13Mar 18, 2024Updated 2 years ago
- Patches adbd to allow `adb root`☆10Mar 14, 2018Updated 8 years ago
- ast pattern matching with automated structure recovery for hex-rays decompiler☆31Mar 11, 2026Updated last week
- ☆17Jun 30, 2023Updated 2 years ago
- Tool to decrypt encrypted strings in AgentTesla☆16Jan 24, 2022Updated 4 years ago
- All the code snippets from my Secure Code Review series on youtube (youtube.com/@muqsitbaig)!☆25Jul 28, 2024Updated last year
- 🛡️ The Ultimate Cybersecurity Library | 160+ curated books, guides & resources covering Ethical Hacking, Penetration Testing, Bug Bounty…☆50Mar 5, 2026Updated 2 weeks ago
- 用codeql分析grafana最新任意文件读取☆11Dec 10, 2021Updated 4 years ago
- Opossum Attack: Application Layer Desynchronization using Opportunistic TLS☆15Jul 28, 2025Updated 7 months ago
- ddc ci utility for linux which live in you tray. Brightnress, sound and input.☆31Jul 3, 2025Updated 8 months ago
- Curriculum Vitae European & Biography☆35Aug 11, 2023Updated 2 years ago
- This is a simple C++ program that will copy clipboard data and upload it to a webserver of your choice!☆18Jan 16, 2024Updated 2 years ago
- HackTricks Automatic Commands (HAC) is an enumeration platform powered by book.HackTricks.xyz☆22Oct 25, 2021Updated 4 years ago
- Characterizing Transaction-Reverting Statements in Ethereum Smart Contracts.☆11Sep 1, 2021Updated 4 years ago
- ☆15Dec 24, 2024Updated last year
- 打线下AWD时使用的工具☆19Dec 16, 2020Updated 5 years ago
- inject and run code into arbitrary process (x86 and x64)☆14Oct 20, 2021Updated 4 years ago