☆31Aug 25, 2023Updated 2 years ago
Alternatives and similar repositories for Tapjacking-ExportedActivity
Users that are interested in Tapjacking-ExportedActivity are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- CVE-2017-13156-Janus复现☆13Sep 7, 2020Updated 5 years ago
- Vuldroid is a Vulnerable Android Application made with security issues in order to demonstrate how they can occur in code☆67Sep 18, 2021Updated 4 years ago
- CVE-2020-0096-StrandHogg2 复现☆13Mar 15, 2021Updated 5 years ago
- ☆19May 18, 2025Updated 10 months ago
- ☆16Mar 26, 2023Updated 2 years ago
- An open-source knowledge base for security researchers.☆18Jan 8, 2025Updated last year
- Spongebob-themed cypher injection playground☆13Jun 4, 2023Updated 2 years ago
- Some simple scripts that I use during bug bounty hunting in Android Apps☆28Jan 30, 2025Updated last year
- The scripts helps security analsts to identify misconfigured firebase instances.☆234Aug 9, 2022Updated 3 years ago
- Cloning apk for bypassing code tampering detection, Google Safety Net and scanning vulnerable plugins☆86Jun 16, 2023Updated 2 years ago
- the POC of package.json RCE☆26Jun 24, 2025Updated 9 months ago
- ActionScript Proof of Concept to perform cross-domain reads☆16Aug 26, 2013Updated 12 years ago
- 武汉大学国家网络安全学院2021级操作系统期末大实验☆12Jan 2, 2024Updated 2 years ago
- bug bounty☆11Aug 13, 2023Updated 2 years ago
- apkfram was written in order to help any mobile penetration testers to identify the Framework used to develop the Android application.☆12Oct 9, 2024Updated last year
- ☆23Oct 17, 2024Updated last year
- The Mobile App Pentest cheat sheet was created to provide concise collection of high value information on specific mobile application pen…☆16Apr 11, 2017Updated 8 years ago
- Android Template Application to Demonstrate a number of Best Practises around Mobile Security☆10May 10, 2018Updated 7 years ago
- Use the python script to select images contains person in the COCO。☆13May 23, 2021Updated 4 years ago
- Small tool to run reverse IP lookup for given IP, IP range or IP list☆13Jan 2, 2020Updated 6 years ago
- Code for paper "Membership Inference Attacks Against Vision-Language Models"☆27Jan 25, 2025Updated last year
- ☆20Dec 10, 2020Updated 5 years ago
- m0bilesecurity's Github Profile Header☆11Dec 5, 2020Updated 5 years ago
- ☆11Oct 6, 2022Updated 3 years ago
- Random scripts and files I use for Android reversing☆17Feb 19, 2013Updated 13 years ago
- ☆12Nov 14, 2024Updated last year
- Content-Security-Policy (CSP) Bypass Techniques☆76Oct 28, 2020Updated 5 years ago
- Writeups for Vulnhub, Tryhackme and Others☆13Jun 25, 2023Updated 2 years ago
- weblogic wls9-async 反序列利用图形版客户端 CNVD-C-2019-48814☆13May 9, 2019Updated 6 years ago
- ☆12May 19, 2025Updated 10 months ago
- TapJacking Attacks Demo☆20Apr 25, 2021Updated 4 years ago
- Designed by Verilog HDL 武汉大学-计算机组成原理-课程实验☆12Sep 25, 2020Updated 5 years ago
- Wayfiles is a tool designed to search for juicy files and URLs within a folder/file with results of tools like gau, waymore, waybackurls,…☆16Feb 22, 2026Updated last month
- [NeurIPS 2023] Bootstrapping Vision-Language Learning with Decoupled Language Pre-training☆27Dec 5, 2023Updated 2 years ago
- This little script for gathering chaos.projectdiscovery.io recon data in an organized way and finding the daily differences on it☆18Aug 9, 2020Updated 5 years ago
- Security Challenges for Starknet☆11May 21, 2024Updated last year
- A straightforward tool for exploiting SMTP Smuggling vulnerabilities.☆14Jul 22, 2024Updated last year
- Public Repository of our Audit Reports☆18Feb 27, 2026Updated 3 weeks ago
- Adversarial Examples Detection Benchmark☆17Dec 6, 2024Updated last year