dibsy / OWASP_Droid10Links
OWASP Droid10 is an opensource handheld system based (android) web application pen testing tool. It can scan for web application vulnerability from any android device.Some features can be customized according to testers need.
☆17Updated 3 years ago
Alternatives and similar repositories for OWASP_Droid10
Users that are interested in OWASP_Droid10 are comparing it to the libraries listed below
Sorting:
- Metasploit Exploit Module for the Android addJavascriptInterface Issue (MITM)☆36Updated 10 years ago
- Provide a sort of shell-ish interface to make file directory traversal quicker and easier.☆24Updated 8 years ago
- Metasploit Usage Wiki☆48Updated 10 years ago
- A tool that enumerates Android devices for information useful in understanding its internals and for exploit development. It supports and…☆53Updated 7 years ago
- Automates sslstrip arp spoofing MITM attack. FOR TESTING PURPOSES ONLY.☆37Updated 9 years ago
- cisco-global-exploiter : This tool detects 14 different vulnerabilities on Cisco routers and switches☆44Updated 6 years ago
- Working Rsh Client With Bind/Reverse Shell☆20Updated 9 years ago
- This module is used to exploit startup script execution through Windows Group Policy settings when configured to run off of a remote SMB …☆22Updated 5 years ago
- A security write-up about the Paypal API & data leakage☆24Updated 9 years ago
- Runs Responder, uploads hashes for cracking, alerts when cracked☆37Updated 9 years ago
- Post-Exploitation Framework☆78Updated 8 years ago
- Mobile Application Vulnerability Detection☆12Updated 8 years ago
- Framework for static and dynamic analysis in Android APKs☆32Updated 7 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Updated 9 years ago
- Post Exploitation Linux Toolkit☆33Updated 8 years ago
- Faraday Workspaces for Bug Bounties☆21Updated 9 years ago
- Tool for automation of GUI-based testing.☆15Updated 10 years ago
- Vulnerable Node.js Web Application to pratice with your pentesting skills☆21Updated 8 years ago
- Platform for Browser Exploitation☆34Updated 10 years ago
- Dorker, programa utilizado para automatizar pesquisas em buscadores, faz uso de alguns filtros.☆16Updated 9 years ago
- ☆20Updated 9 years ago
- Local enumeration and exploitation framework.☆18Updated 7 years ago
- XSS payload designed to steal LastPass users' credentials☆16Updated 11 years ago
- A modular pentesting framework implemented in C☆14Updated 6 years ago
- IRC bot for cracking hashes☆18Updated 4 years ago
- SQL Injection without the pain of syringes.☆25Updated 8 years ago
- Automating LFI/RFI using Burp Proxy Logs and fimap☆13Updated 13 years ago
- Some exploits for ZeroNights 0x03☆36Updated 10 years ago
- Check privileges, settings and other information on Linux systems and suggest exploits based on kernel versions☆25Updated 7 years ago
- Hasher is designed to be a tool that allows you to quickly hash plaintext strings, or compare hashed values with a plaintext locally. Not…☆52Updated 3 years ago