Automatic tool to find arbitrary Intent that gets reflected back vulnerabilities on Android apps.
☆12Nov 15, 2022Updated 3 years ago
Alternatives and similar repositories for vecna
Users that are interested in vecna are comparing it to the libraries listed below
Sorting:
- Manage your Dofus Retro accounts☆11Jul 5, 2024Updated last year
- Enumerate your Kubernetes cluster with just 1 command☆11Updated this week
- A Static and Extensible Black-box Application Security Testing tool for iOS and Android applications☆36May 12, 2025Updated 9 months ago
- A way to use XInput to insert PIN for login, useful for handheld devices that does not have Fingerprint or face reco☆12Nov 3, 2024Updated last year
- OpenCore EFI Folder for Acer Aspire 3 A315-56-327T☆10Sep 6, 2024Updated last year
- ☆16Dec 20, 2024Updated last year
- SecureEye is an AI tool for secure code review. It assesses code for vulnerabilities, and common attack vectors☆14May 21, 2024Updated last year
- an Evil Java RMI Registry.☆51Feb 8, 2023Updated 3 years ago
- ☆48Apr 15, 2022Updated 3 years ago
- ☆10Jul 21, 2022Updated 3 years ago
- Tool for generating Memory.scan() compatible instruction search patterns☆14Jul 29, 2022Updated 3 years ago
- 各种CMS、各种平台、各种系统、各种软件漏洞的EXP、POC ,该项目将持续更新☆13Apr 18, 2022Updated 3 years ago
- This is a VxLAN PoC code for Talks: From Spoofing to Tunneling: New Red Team's Networking Techniques for Initial Access and Evasion☆28Jul 21, 2025Updated 7 months ago
- Android mirror manifest for CodeAurora☆10Dec 31, 2025Updated 2 months ago
- JavaAgent内存马实现、检测、修复demo☆11Dec 7, 2022Updated 3 years ago
- Host Discovery Tool☆10Jan 17, 2022Updated 4 years ago
- Detect common classes of XPC exploits☆15Dec 6, 2024Updated last year
- Java Web shell project☆12Oct 22, 2021Updated 4 years ago
- A version-agnostic ghidra plugin for de-compiling Qualcomm Hexagon QDSP6☆28Updated this week
- This is the official repository for the CarPi project.☆10Jul 16, 2019Updated 6 years ago
- Script Android from TCP socket☆12May 13, 2022Updated 3 years ago
- A collection of Apple-related CTF writeups☆15Jan 17, 2022Updated 4 years ago
- ☆11Dec 7, 2025Updated 2 months ago
- Documentos elaborados en la Coordinación de Proyectos e Investigaciones de Ciberseguridad☆10Apr 25, 2018Updated 7 years ago
- ☆13Feb 2, 2022Updated 4 years ago
- perl, non-alphanumeric, php☆10Mar 16, 2017Updated 8 years ago
- Exploit for CVE-2023-38571☆13Sep 27, 2023Updated 2 years ago
- ☆12Apr 17, 2022Updated 3 years ago
- NativePayload_TiACBT (Remote Thread Injection + C# Async Method + CallBack Functions Technique)☆13Jun 6, 2023Updated 2 years ago
- This is to reorganize my notes☆10Apr 26, 2021Updated 4 years ago
- ☆14Jun 27, 2024Updated last year
- 检测邮件发送的可行性,可用来红队作战中对目标邮箱账户测试。The feasibility sent by the detection mail can be used for the target mailbox account test in the Red Team b…☆10May 8, 2023Updated 2 years ago
- Control Frame Attack Vulnerability Detection Tool (GitLab Mirror)☆12Dec 2, 2024Updated last year
- Automating Juicy Potato Local Privilege Escalation CMD exploit for penetration testers.☆48Dec 13, 2022Updated 3 years ago
- Scripts for OWASP-ZAP☆13Oct 7, 2025Updated 4 months ago
- Tablero de Control #SGSI #ISO27001☆11Sep 22, 2021Updated 4 years ago
- .NET wrapper around LogonUserA to test creds☆12Jun 2, 2022Updated 3 years ago
- Solutions from @PortSwigger labs☆13Apr 11, 2024Updated last year
- Automated git conventional commits and semantic versioning☆11Dec 27, 2025Updated 2 months ago