dibsy / OWASP_Droid10
OWASP Droid10 is an opensource handheld system based (android) web application pen testing tool. It can scan for web application vulnerability from any android device.Some features can be customized according to testers need.
☆16Updated 3 years ago
Alternatives and similar repositories for OWASP_Droid10:
Users that are interested in OWASP_Droid10 are comparing it to the libraries listed below
- A tool that enumerates Android devices for information useful in understanding its internals and for exploit development. It supports and…☆51Updated 7 years ago
- Tool for automation of GUI-based testing.☆15Updated 10 years ago
- Metasploit Usage Wiki☆48Updated 10 years ago
- python code to connect to mail servers and pillage the data contained within☆10Updated 9 years ago
- Working Rsh Client With Bind/Reverse Shell☆20Updated 9 years ago
- ☆28Updated 9 years ago
- Provide a sort of shell-ish interface to make file directory traversal quicker and easier.☆24Updated 8 years ago
- Simple Bash script to retrieve basic system information.☆30Updated 6 years ago
- DPE - Default Password Enumeration☆34Updated 11 years ago
- SQL Injection without the pain of syringes.☆25Updated 7 years ago
- Concurrently test bing results for shellshock vulnerability☆42Updated 10 years ago
- Metasploit Exploit Module for the Android addJavascriptInterface Issue (MITM)☆35Updated 10 years ago
- w3af packaging for Kali distribution☆26Updated 9 years ago
- Vulnerable Node.js Web Application to pratice with your pentesting skills☆21Updated 7 years ago
- ☆27Updated 7 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Updated 9 years ago
- Specify targets and run sets of tools against them☆11Updated 9 years ago
- The Adaptive Security Testing Methodology (ASTM) provides context-adjusted testing methodologies based on factors such as time available …☆45Updated 2 years ago
- Proof of Concepts, Exploits☆28Updated 6 years ago
- Faraday Workspaces for Bug Bounties☆20Updated 9 years ago
- A modular pentesting framework implemented in C☆14Updated 6 years ago
- Multithreaded DNS recursive host brute-force tool☆13Updated 9 years ago
- For collecting probed SSID name by wireless devices, Access point detail and connected clients.☆35Updated 11 years ago
- This module is used to exploit startup script execution through Windows Group Policy settings when configured to run off of a remote SMB …☆22Updated 5 years ago
- An automated Python + Ruby based XXE Exploiter (GUI + CLI)☆20Updated 8 years ago
- ☆47Updated 9 years ago
- ☆20Updated 8 years ago
- Automatically exported from code.google.com/p/unix-security-file-parser☆34Updated 9 years ago
- Search google for shellshock vulnerable sites☆27Updated 10 years ago
- Software exploitation training material☆15Updated 7 years ago