carlospolop / Tapjacking-ExportedActivity
☆21Updated last year
Related projects ⓘ
Alternatives and complementary repositories for Tapjacking-ExportedActivity
- Application for showcasing Android Deep Link and WebView Vulnerabilities☆14Updated last year
- Droz_scan is a automated script, that runs all the queries of drozer in a single run☆24Updated last year
- my own 2fa bypass methodolgy☆22Updated last year
- ☆21Updated 2 years ago
- ☆13Updated 7 months ago
- Enhanced 403 bypass header☆21Updated 2 years ago
- Information Security Information From Web☆26Updated last month
- A tool for Subdomain takeovers detection☆26Updated 2 years ago
- This tool is designed to test for file upload and XXE vulnerabilities by poisoning XLSX files.☆68Updated 10 months ago
- Intentionally Vulnerable Nodejs Application & APIs☆22Updated 2 years ago
- A simple automation tool to detect lfi, rce and ssti vulnerability☆55Updated 2 years ago
- offy is a tool for bugbounty hunters to save money in their EC2 instances☆13Updated last year
- JSNotify is a Python script designed to monitor JavaScript files in a specified directory for changes. This tool can be used by developer…☆18Updated 11 months ago
- Find CVEs that don't have a Detectify modules.☆21Updated last year
- Buggyapp is an vulnerable android application. This app can be used by pentesters, security researchers to practice Android application p…☆13Updated 2 years ago
- collection of various grep patterns collected from tomnomnom/gf and other places☆21Updated 4 years ago
- ☆20Updated last year
- A Burp Extension that makes it easier to view all script code on a Response.☆11Updated 11 months ago
- This repository has workflows created for https://github.com/RikunjSindhwad/Task-Ninja☆21Updated 2 months ago
- ☆16Updated last year
- Check if domain has bug bounty program or not☆29Updated last year
- ☆27Updated last year
- Automated HTTP Request Repeating With Burp Suite☆34Updated last year
- ☆13Updated last year
- Prototype-Pollution-Lab to chain the vulnerabilities between multiple accounts.☆13Updated 3 years ago
- ☆15Updated 6 months ago
- An exhaustive list of all the possible ways you can chain your Blind SSRF vulnerability☆16Updated 3 years ago
- Supertruder but better☆33Updated last year
- An android application which exploits sieve through android components.☆42Updated 7 years ago