coreb1t / mobile-pentest-toolkit
☆18Updated last year
Alternatives and similar repositories for mobile-pentest-toolkit:
Users that are interested in mobile-pentest-toolkit are comparing it to the libraries listed below
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 4 years ago
- Escalation Servers and Scripts for Priv Escalation☆19Updated 5 years ago
- hostapd and wpa_supplicant 2.7 vulnerable to Mathy's WPA3 bugs☆23Updated 5 years ago
- Scripts for OSCE☆18Updated 6 years ago
- Miscellaneous exploit scripts☆17Updated 2 years ago
- A wrap up script to auto perform nmap scan from the result of dnsrecon, then output result with filename as hostname and ip☆11Updated 6 years ago
- This document proposes a way of standardising the structure, language, and grammar used in security policies.☆25Updated 7 years ago
- Cryptocurrencies related Security resources☆14Updated last year
- Find unreferenced AWS S3 buckets which have CloudFront CNAME records pointing to them☆37Updated 6 years ago
- PowerUpSQL: A PowerShell Toolkit for Attacking SQL Server☆8Updated 7 years ago
- A tool for fuzzing for ports that allow outgoing connections☆18Updated 6 years ago
- LyncSniper: A tool for penetration testing Skype for Business and Lync deployments☆9Updated 7 years ago
- Interactive Post Exploitation Tool☆36Updated 5 years ago
- Collection of things made during my SLAE 32-bit journey☆14Updated 3 years ago
- A Bash script to test a list of URLs for the shellshock vulnerability.☆26Updated 5 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆22Updated 6 years ago
- A modular pentesting framework implemented in C☆14Updated 6 years ago
- Useful Windows and AD tools☆15Updated 3 years ago
- Multithreaded DNS recursive host brute-force tool☆13Updated 9 years ago
- Software exploitation training material☆15Updated 7 years ago
- ☆34Updated 2 months ago
- Vulnerability Assessment and Penetration Testing Toolkit☆18Updated 3 years ago
- The Shodan monitoring tools allows you to monitor shodan listed servers basis on the filter you provided☆33Updated 3 years ago
- This is a lazy enumeration script made to make bug bounty enum & pentest flyovers easy as cake!☆14Updated 4 years ago
- Personal blog about security, exploitation, CTFs, ...☆20Updated 6 years ago
- Hand list of Powershell commands frequently used during penetration tests☆14Updated 6 years ago
- Search the ExploitDB with a little more control☆21Updated 7 years ago
- Perform various SMB-related attacks, particularly useful for testing large Active Directory environments.☆40Updated 2 years ago
- CVE-2018-13379 Script for Nmap NSE.☆12Updated 4 years ago
- Basic tool to automate backdooring PE files☆54Updated 3 years ago