dibsy / OWASP_Droid10Links
OWASP Droid10 is an opensource handheld system based (android) web application pen testing tool. It can scan for web application vulnerability from any android device.Some features can be customized according to testers need.
☆17Updated 3 years ago
Alternatives and similar repositories for OWASP_Droid10
Users that are interested in OWASP_Droid10 are comparing it to the libraries listed below
Sorting:
- A tool that enumerates Android devices for information useful in understanding its internals and for exploit development. It supports and…☆54Updated 7 years ago
- Metasploit Exploit Module for the Android addJavascriptInterface Issue (MITM)☆36Updated 10 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Updated 9 years ago
- Metasploit Usage Wiki☆47Updated 10 years ago
- Framework for static and dynamic analysis in Android APKs☆32Updated 8 years ago
- The development place of AFFT, a toolkit to automatically acquire and extract data from Android image dumps☆47Updated 9 years ago
- A python script for obfuscating wireless networks☆79Updated 8 years ago
- A security write-up about the Paypal API & data leakage☆25Updated 9 years ago
- A remote msfconsole written in Python 2.7 to connect to the msfrcpd server of metasploit. This tool gives you the ability to load modules…☆57Updated 7 years ago
- Android Connections Forensics☆33Updated 9 years ago
- Xenotix xBOT is a Cross Platform PoC Bot that abuse certain Google Services to implement it's C&C☆27Updated 7 years ago
- hemingway is a simple and easy to use spear phishing helper.☆42Updated 8 years ago
- This module is used to exploit startup script execution through Windows Group Policy settings when configured to run off of a remote SMB …☆22Updated 5 years ago
- A ready to deploy docker container for a fresh sandbox for on-the-fly malware analysis☆42Updated 8 years ago
- Proof of Concepts, Exploits☆28Updated 6 months ago
- Working Rsh Client With Bind/Reverse Shell☆19Updated 10 years ago
- Post-Exploitation Framework☆78Updated 8 years ago
- Post Exploitation Linux Toolkit☆33Updated 9 years ago
- SQL Injection without the pain of syringes.☆25Updated 8 years ago
- Static and automated/dynamic malware analysis☆47Updated 10 years ago
- A brief analysis of the BlueBorne Vulnerability Scanner app by Armis☆23Updated 8 years ago
- Linux tool used to extract sensitive data, inject backdoor or drop remote shells on android devices.☆107Updated 9 years ago
- Automates sslstrip arp spoofing MITM attack. FOR TESTING PURPOSES ONLY.☆37Updated 9 years ago
- Mobile Application Vulnerability Detection☆12Updated 8 years ago
- Exploit Reliability Testing System☆35Updated 10 years ago
- Search google for shellshock vulnerable sites☆27Updated 11 years ago
- Password cracking utility☆53Updated 4 years ago
- Tool for automation of GUI-based testing.☆16Updated 10 years ago
- New and Improved☆17Updated 9 years ago
- Local privilege escalation scripts and tools☆17Updated 9 years ago