OWASP Droid10 is an opensource handheld system based (android) web application pen testing tool. It can scan for web application vulnerability from any android device.Some features can be customized according to testers need.
☆17Jan 23, 2022Updated 4 years ago
Alternatives and similar repositories for OWASP_Droid10
Users that are interested in OWASP_Droid10 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- My collection of exploit development skeletons for fuzzing, overwriting the stack, remote code execution, etc.☆16Mar 19, 2025Updated last year
- Universal Android root tool based on CVE-2016-5195. Watch this space.☆31Oct 29, 2016Updated 9 years ago
- Penguin Xposed Framework☆10Apr 15, 2019Updated 6 years ago
- an android application to install a full java runtime on a phone.☆45Jun 22, 2015Updated 10 years ago
- cSploit network radar☆32Apr 10, 2016Updated 9 years ago
- Content for cyber defense course☆14Oct 15, 2014Updated 11 years ago
- Android app to set an static ARP entry on the gateway's MAC address when you connect to a WIFI network☆11Nov 23, 2012Updated 13 years ago
- Collection of things made during my SLAE 32-bit journey☆14Feb 24, 2022Updated 4 years ago
- -notes and scripts for online course OffIOT☆12Jan 19, 2026Updated 2 months ago
- Windows / Linux Local Privilege Escalation Workshop☆11Jan 15, 2019Updated 7 years ago
- A collection of open source and commercial tools that aid in red team operations.☆13Jun 14, 2018Updated 7 years ago
- Multithreaded HTTP Download Accelerator☆23Jul 27, 2014Updated 11 years ago
- A Simple Http to Raw Socket Adapter for Android☆12Aug 30, 2015Updated 10 years ago
- Simple script to generate commands to achieve reverse shells.☆12Aug 12, 2019Updated 6 years ago
- Eclipse plugin to remote adb to an android device.☆24May 10, 2013Updated 12 years ago
- Droppers for all platforms☆30Jul 6, 2015Updated 10 years ago
- Geolocating Internet infrastructure☆13Apr 26, 2018Updated 7 years ago
- Feed for verious malicious IPs such as malware and botnets☆12Jun 20, 2016Updated 9 years ago
- Mimicking grids in Android lists☆148Apr 15, 2015Updated 10 years ago
- PowerShell interpreter for unmanaged (non CLI) C++ projects☆16Jul 19, 2017Updated 8 years ago
- Fuzzing Framework☆10Oct 23, 2017Updated 8 years ago
- pentestscripts☆16Sep 16, 2019Updated 6 years ago
- A tool evaluates security configurations of a given PE based on SDL without source code☆15Jul 6, 2014Updated 11 years ago
- Simple, lightweight and compact key logger written for fun ...☆17Sep 12, 2018Updated 7 years ago
- A blanket execution/min hash semantic hash tool for binary function identification☆18Apr 22, 2016Updated 9 years ago
- Scan git repos for secrets using regex and entropy 🔑☆10Jun 18, 2020Updated 5 years ago
- Sample code for ICS security blog posts☆19Dec 2, 2012Updated 13 years ago
- Learning Penetration Testing of Android Applications☆80Aug 5, 2017Updated 8 years ago
- ☆11Jul 16, 2017Updated 8 years ago
- PoC Reverse Text segment ELF File infector☆14Feb 28, 2020Updated 6 years ago
- ReverShellGenerator - A tool to generate various ways to do a reverse shell☆12Mar 2, 2019Updated 7 years ago
- A simple powershell script which gives handy compliance report.☆19Nov 27, 2017Updated 8 years ago
- An android app to hide files within other files☆15May 9, 2016Updated 9 years ago
- The androidvulnerabilities.org website and source data☆21Jul 7, 2020Updated 5 years ago
- No one writes dumb malware anymore. This is a repo for dumb malware.☆10Apr 18, 2017Updated 8 years ago
- Hacking challenges☆16Oct 17, 2019Updated 6 years ago
- Java library to compile and run C++ code in-memory☆15Oct 15, 2017Updated 8 years ago
- WSLTools☆23Jul 5, 2018Updated 7 years ago
- Proof of Concept of the steganographic algorithms implemented by APT 29 (Hammertos)☆10Nov 26, 2018Updated 7 years ago