dibsy / OWASP_Droid10Links
OWASP Droid10 is an opensource handheld system based (android) web application pen testing tool. It can scan for web application vulnerability from any android device.Some features can be customized according to testers need.
☆17Updated 3 years ago
Alternatives and similar repositories for OWASP_Droid10
Users that are interested in OWASP_Droid10 are comparing it to the libraries listed below
Sorting:
- Metasploit Usage Wiki☆47Updated 10 years ago
- A tool that enumerates Android devices for information useful in understanding its internals and for exploit development. It supports and…☆54Updated 7 years ago
- A ready to deploy docker container for a fresh sandbox for on-the-fly malware analysis☆42Updated 8 years ago
- Framework for static and dynamic analysis in Android APKs☆32Updated 8 years ago
- Linux tool used to extract sensitive data, inject backdoor or drop remote shells on android devices.☆107Updated 9 years ago
- SQL Injection without the pain of syringes.☆25Updated 8 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Updated 9 years ago
- cisco-global-exploiter : This tool detects 14 different vulnerabilities on Cisco routers and switches☆44Updated 6 years ago
- Dorker, programa utilizado para automatizar pesquisas em buscadores, faz uso de alguns filtros.☆16Updated 9 years ago
- hemingway is a simple and easy to use spear phishing helper.☆42Updated 8 years ago
- Metasploit Exploit Module for the Android addJavascriptInterface Issue (MITM)☆36Updated 10 years ago
- Android Connections Forensics☆33Updated 9 years ago
- A python script for obfuscating wireless networks☆79Updated 8 years ago
- A security write-up about the Paypal API & data leakage☆24Updated 9 years ago
- The iOS Agent for the Needle Security Assessment Framework☆43Updated 8 years ago
- Tool for automation of GUI-based testing.☆16Updated 10 years ago
- This module is used to exploit startup script execution through Windows Group Policy settings when configured to run off of a remote SMB …☆22Updated 5 years ago
- A brief analysis of the BlueBorne Vulnerability Scanner app by Armis☆23Updated 8 years ago
- Static and automated/dynamic malware analysis☆47Updated 10 years ago
- Password cracking utility☆53Updated 4 years ago
- Post Exploitation Linux Toolkit☆33Updated 8 years ago
- Collection of my Python Scripts☆41Updated 5 years ago
- Simple framework to extract "actionable" data from Android malware (C&Cs, phone numbers etc.)☆107Updated 10 years ago
- An alternative for Metasploit psexec module, with automation capabilites to run across multiple hosts, while detecting the correct archit…☆14Updated 9 years ago
- Network based protocol fuzzer☆75Updated 3 years ago
- A tool to perform automated forensic analysis of Chrome Browser.☆33Updated 8 years ago
- Exploits and research stuffs☆56Updated 2 years ago
- Android Device Testing Framework ("dtf")☆85Updated 2 years ago
- ssh session type for metasploit☆100Updated 2 years ago
- Vulnerable Node.js Web Application to pratice with your pentesting skills☆21Updated 8 years ago