☆42Jul 16, 2018Updated 7 years ago
Alternatives and similar repositories for VulnerableAndroidAppOracle
Users that are interested in VulnerableAndroidAppOracle are comparing it to the libraries listed below
Sorting:
- Insecure Vulnerable Android Application that helps to learn hacing and securing apps☆21Oct 4, 2015Updated 10 years ago
- Test Android Application.☆20Jan 22, 2016Updated 10 years ago
- Created by High-Tech Bridge, the Purposefully Insecure and Vulnerable Android Application (PIVAA) replaces outdated DIVA for benchmark of…☆106May 27, 2020Updated 5 years ago
- An android application which exploits sieve through android components.☆44Sep 17, 2017Updated 8 years ago
- Android Digital Bank Vulnerable Mobile App☆37Aug 15, 2015Updated 10 years ago
- A Burp Extender plugin that will allow you to tamper with requests containing compressed, serialized java objects.☆24Mar 1, 2019Updated 7 years ago
- Damn Vulnerable Hybrid Mobile App (DVHMA) is an hybrid mobile app (for Android) that intentionally contains vulnerabilities.☆269Aug 22, 2018Updated 7 years ago
- This burpsuite extender provides a solution on testing Enterprise applications that involve security Authorization tokens into every HTTP…☆47Feb 27, 2019Updated 7 years ago
- The DetectDynamicJS Burp Extension provides an additional passive scanner that tries to find differing content in JavaScript files and ai…☆13Dec 17, 2018Updated 7 years ago
- Application Security Vulnerability Periodic Table☆14Aug 25, 2014Updated 11 years ago
- The scripts helps security analsts to identify misconfigured firebase instances.☆232Aug 9, 2022Updated 3 years ago
- An SNMPv1, v2c and v3 dictionary attack tool. Please see: https://penturalabs.wordpress.com/2016/04/01/snmpplux/☆20Jun 29, 2016Updated 9 years ago
- Vulnerable Windows Driver with exploits which were used for demonstration purposes on Hunting and exploiting bugs in kernel drivers prese…☆13Jan 29, 2013Updated 13 years ago
- Generates Flash based CORS CSRF Proof of Concepts that can be sent directly to clients☆14Jul 3, 2013Updated 12 years ago
- NMAP NSE that enumerates VNC authentication types☆17Dec 21, 2010Updated 15 years ago
- An in-development fork of the Riverloopsec Killerbee Project with additional tools / bugfixes☆11Jan 16, 2018Updated 8 years ago
- Ruby Oracle Security Scanner☆16Jul 9, 2012Updated 13 years ago
- Evil snippets of Underhanded Red Team tactics☆11Jul 5, 2017Updated 8 years ago
- Various pentest scripts☆14Mar 17, 2014Updated 12 years ago
- Vulnerable Android application for developers and security enthusiasts to learn about Android insecurities☆1,418Apr 17, 2024Updated last year
- Distributed password cracker for operating over high latency networks of loosely coupled hosts.☆13Jul 30, 2013Updated 12 years ago
- ☆20May 1, 2024Updated last year
- Study about HQL injection exploitation.☆51May 15, 2016Updated 9 years ago
- Wordlist to get files/ folders listed by the app that may expose passwords, sensitive file or folders☆22Jul 10, 2020Updated 5 years ago
- Updated version of SWFIntruder☆27Aug 16, 2016Updated 9 years ago
- Windows Privesc Check☆20May 20, 2014Updated 11 years ago
- A Burp Suite extension that checks if a particular URL responds differently to various User-Agent headers☆15Sep 4, 2014Updated 11 years ago
- A curated list of awesome resources for tracking vulnerabilities in software☆18May 4, 2017Updated 8 years ago
- Security challenges and CTFs created by the Penultimate team.☆13Feb 22, 2018Updated 8 years ago
- ☆16Oct 23, 2015Updated 10 years ago
- ☆13Apr 8, 2022Updated 3 years ago
- Find subfolders in the Windows folder which have bad ACL and allow write and execute☆14Oct 20, 2015Updated 10 years ago
- Ruby On Rails unrestricted render() exploit☆16Feb 9, 2018Updated 8 years ago
- Forked from joomscan-owasp at 26/02/2015 to add new functionality☆14Feb 26, 2015Updated 11 years ago
- Enumerate subdomains through Virustotal☆32Nov 2, 2019Updated 6 years ago
- Various tools, exploits and other short code snippets☆12Dec 25, 2018Updated 7 years ago
- Burp Extender to add unique form tokens to scanner requests.☆13Nov 5, 2024Updated last year
- Self contained htaccess shells and attacks☆16May 18, 2018Updated 7 years ago
- Ansible role for security standards compliance☆13Mar 6, 2019Updated 7 years ago