coreb1t / mobile-pentest-toolkitLinks
☆18Updated last year
Alternatives and similar repositories for mobile-pentest-toolkit
Users that are interested in mobile-pentest-toolkit are comparing it to the libraries listed below
Sorting:
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆51Updated 4 years ago
- hostapd and wpa_supplicant 2.7 vulnerable to Mathy's WPA3 bugs☆23Updated 5 years ago
- A modular pentesting framework implemented in C☆14Updated 6 years ago
- random buffer overflows as I get ready to take the oscp in 2097☆12Updated 7 years ago
- A wrap up script to auto perform nmap scan from the result of dnsrecon, then output result with filename as hostname and ip☆11Updated 6 years ago
- Escalation Servers and Scripts for Priv Escalation☆19Updated 5 years ago
- A tool for fuzzing for ports that allow outgoing connections☆18Updated 6 years ago
- Oracle Attacks Tool☆13Updated 8 years ago
- ☆33Updated 5 months ago
- Burp Suite Pro extension☆10Updated 8 years ago
- Find unreferenced AWS S3 buckets which have CloudFront CNAME records pointing to them☆37Updated 6 years ago
- GUI Tool to generate threat intelligence information in various formats☆43Updated 7 years ago
- Automated install process for Phishing Frenzy☆24Updated 10 years ago
- A playground to practice SSRF Attacks against web apps☆17Updated 6 years ago
- The Recon scanning tool scans websites for open files & directories specified in the custom config file. Default server configuration fil…☆15Updated 7 years ago
- buffer overflow examples☆22Updated 7 years ago
- Python crawler for remote Windows shares☆12Updated 9 years ago
- DPE - Default Password Enumeration☆34Updated 12 years ago
- A multi-threaded scanner that helps identify CORS flaws/misconfigurations☆19Updated 5 years ago
- Scripts for OSCE☆18Updated 6 years ago
- Insecure Vulnerable Android Application that helps to learn hacing and securing apps☆21Updated 9 years ago
- ☆15Updated 2 years ago
- ☆20Updated 5 years ago
- The Shodan monitoring tools allows you to monitor shodan listed servers basis on the filter you provided☆33Updated 4 years ago
- A Bash script to test a list of URLs for the shellshock vulnerability.☆26Updated 5 years ago
- Get detailed information about a Twitter user activity☆17Updated 7 years ago
- Hand list of Powershell commands frequently used during penetration tests