Application for showcasing Android Deep Link and WebView Vulnerabilities
☆16Mar 22, 2023Updated 3 years ago
Alternatives and similar repositories for BuggyWebview
Users that are interested in BuggyWebview are comparing it to the libraries listed below
Sorting:
- A plugin to get our hackerone reports data into obsidian☆12Jan 28, 2026Updated last month
- ☆18Dec 9, 2023Updated 2 years ago
- a recon framework that facilitates discovering, scanning and monitoring assets trough a configurable engine running on serverless aws inf…☆12Aug 26, 2024Updated last year
- The official package for Pling. Pling is a cloud based logging service for aggregating, grouping and displaying logs from across your ent…☆10Dec 3, 2022Updated 3 years ago
- JavaScript files used to bypass Root Detection & SSL Pinning in Frida.☆15Sep 12, 2022Updated 3 years ago
- Crawlex is a powerful Chrome extension designed to assist bug bounty hunters in their work by enabling easy crawling of all possible URLs…☆12May 28, 2023Updated 2 years ago
- A bash tool used to install famous bug bounty tools. Mainly used when setting up a fresh environment.☆16Mar 20, 2023Updated 3 years ago
- A collection of js analysis tools & scripts.☆19Mar 8, 2026Updated 2 weeks ago
- Script for Bug Bounty☆29Sep 17, 2021Updated 4 years ago
- This tools used for Automating finding of subdomain, and checking for alive subdomain, and gathering js files from all the subdomain and …☆23Jun 28, 2024Updated last year
- Android Penetration Testing setup tool. Garuda automates the installation of the required tools to perform Android Security Analysis.☆73Sep 10, 2023Updated 2 years ago
- C# Client/SDK to interact with Uplay/Ubisoft API's☆14Sep 12, 2025Updated 6 months ago
- Android App for running UART GATT Server (Peripheral) on phone☆15Dec 16, 2016Updated 9 years ago
- Private vulnerability testing suite☆13Mar 30, 2021Updated 4 years ago
- ☆14Mar 20, 2025Updated last year
- Updated Android biometric bypass script for Frida (from Kamil Breński, Krzysztof Pranczk and Mateusz Fruba, August 2019). The code resolv…☆43Jan 31, 2023Updated 3 years ago
- Android App Reverse Engineering & Analysis Toolkit☆17Jul 10, 2024Updated last year
- Secrets detection based on regular expressions.☆22Apr 15, 2025Updated 11 months ago
- ☆10Dec 8, 2022Updated 3 years ago
- Bug Bounty tool to automate the recon process.☆12Oct 4, 2023Updated 2 years ago
- MQTT Security Testing☆24Jul 26, 2022Updated 3 years ago
- My collection of Semgrep rules for vulnerability detection on source code (swift, java, cobol)☆43Dec 3, 2025Updated 3 months ago
- ☆20Nov 1, 2022Updated 3 years ago
- Control wireless sockets, alarm systems or sex toys with a small, easy to build remote.☆18Oct 2, 2016Updated 9 years ago
- 🚧 Bypass Android SSL Pinning with ProxyMan and Frida☆31Aug 1, 2024Updated last year
- Um compilado de links para introduzir os chegados nas artes negras da engenharia reversa.☆26Aug 21, 2020Updated 5 years ago
- PoC script for CVE-2023-20110 - Cisco Smart Software Manager On-Prem SQL Injection Vulnerability☆16Jul 16, 2023Updated 2 years ago
- Bcheck scripts for Burp☆28Aug 7, 2024Updated last year
- Performs a deauth attack and sends beacon frames to flood the list of available WiFi networks with "fake" Access Points.☆15Jul 27, 2017Updated 8 years ago
- Google maps api key checker for pentesting purpose☆28Oct 12, 2022Updated 3 years ago
- A burp for intents wannabe☆80Jul 29, 2024Updated last year
- parse ffuf & map endpoints to wordlists☆21Feb 25, 2021Updated 5 years ago
- E²VA short for Exploitation Experience with Vulnerable App is a vulnerable app to learn userspace exploitation on Android☆17Sep 18, 2023Updated 2 years ago
- ☆38Nov 27, 2020Updated 5 years ago
- Automated script to convert and push Burp Suite certificate in Android, and modify Android's IP table to redirect all traffic to Burp Sui…☆111Apr 30, 2023Updated 2 years ago
- Cool One Liners at one place to make your recon and bug bounty skills better !☆15Oct 3, 2020Updated 5 years ago
- A MBR Fuzzer☆31Apr 3, 2024Updated last year
- Basic brute-force script targeting the standard Keycloak Admin/User Console browser login flow.☆25Apr 6, 2025Updated 11 months ago
- A proof of concept project to detect an stop Evil Twin Attacks.☆17Oct 3, 2019Updated 6 years ago