docker env for ios research on a mac host
☆28Jun 12, 2025Updated 8 months ago
Alternatives and similar repositories for iosEnv
Users that are interested in iosEnv are comparing it to the libraries listed below
Sorting:
- Tools for auditing WAFS☆19Feb 25, 2022Updated 4 years ago
- A Burp Suite extension for Lightning/Aura framework security testing with advanced action management, context editing, and comprehensive …☆54Nov 17, 2025Updated 3 months ago
- My collection of exploit development skeletons for fuzzing, overwriting the stack, remote code execution, etc.☆16Mar 19, 2025Updated 11 months ago
- Generate CodeQL taint-tracking models for Go (along with tests) in a graphical UI☆20May 5, 2023Updated 2 years ago
- For Public Objects☆21Oct 27, 2024Updated last year
- WallEscape vulnerability in util-linux☆51Mar 30, 2024Updated last year
- Seamless AI Integration into Caido☆42Feb 23, 2026Updated last week
- Designed and implemented a custom CNN learning architecture for deep fake image detection using a pre-trained Xception model and achieved…☆10Feb 7, 2023Updated 3 years ago
- A user enumeration tool for Slack.☆36Jun 10, 2024Updated last year
- Pentester-focused Docker registry tool to enumerate and pull images☆36Oct 19, 2025Updated 4 months ago
- A set of Gitlab pipelines and Github workflows to automate and ease on BugBounty and Penetration Testing engagements☆28Dec 18, 2022Updated 3 years ago
- PoC for CVE-Requested vulnerability in Amazon ECS (EC2 launch type) allowing cross-task IAM credential theft.☆47Aug 20, 2025Updated 6 months ago
- Duplicate not owned Token from Running Process☆74Jul 21, 2023Updated 2 years ago
- ☆13Aug 5, 2025Updated 7 months ago
- Learning source code review, spot vulnerability, find some ways how to fix it.☆30Nov 17, 2022Updated 3 years ago
- Deptective automatically determines the native dependencies required to run any arbitrary program or command.☆129Feb 13, 2026Updated 2 weeks ago
- XNU Image Fuzzer - iOS App for Fuzzing Images with Objective-C Code covering 12 CGCreateBitmap & CGColorSpace Functions working with Raw …☆39Feb 4, 2026Updated last month
- Use burp's JS static code analysis on code from your local system.☆43Dec 22, 2016Updated 9 years ago
- ☆10Sep 24, 2021Updated 4 years ago
- An interactive, TLS-capable HTTP intercepting proxy designed for penetration testers and software developers, including a parser for the …☆22Jul 31, 2025Updated 7 months ago
- Cybersecurity Psychology Framework☆19Feb 22, 2026Updated last week
- Easy 802.1Q VLAN Hopping☆80Jul 23, 2024Updated last year
- Combine words from two wordlist files and concatenate them with an optional delimiter☆38Sep 25, 2023Updated 2 years ago
- EyeDP is an Identity Provider☆10Feb 29, 2024Updated 2 years ago
- ☆44Updated this week
- ☆12Jul 4, 2024Updated last year
- ☆14Feb 19, 2023Updated 3 years ago
- contains C programs that tests the effectiveness of SAST.☆12Jan 9, 2024Updated 2 years ago
- C# SDK for SecureAuth IdP API☆11May 31, 2023Updated 2 years ago
- PoC List☆10Sep 4, 2022Updated 3 years ago
- ☆10Mar 11, 2024Updated last year
- WTF Snapshot fuzzing of macOS targets☆98May 31, 2024Updated last year
- Search Email Accounts (OWA) for Passwords, PAN numbers as well as other Keywords☆41Mar 24, 2018Updated 7 years ago
- Create tar/zip archives that try to exploit zipslip vulnerability.☆48Sep 20, 2024Updated last year
- Sample Random GitHub Repositories☆11Dec 27, 2025Updated 2 months ago
- The Public Physical Pentesting Paraphernalia Project (P5) is a collection of 3D printing models, DIY tool instructions and entry-level me…☆12Sep 6, 2019Updated 6 years ago
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆10Aug 18, 2022Updated 3 years ago
- ☆12Oct 22, 2023Updated 2 years ago
- Pghostile is a tool to automate the exploitation of PostgreSQL® specific vulnerabilities that could lead to privilege escalation. It can …☆11Aug 17, 2023Updated 2 years ago