A list of checks with tips for analyzing the security of Android applications
☆14Nov 19, 2019Updated 6 years ago
Alternatives and similar repositories for YAASC
Users that are interested in YAASC are comparing it to the libraries listed below
Sorting:
- ☆39Apr 8, 2020Updated 5 years ago
- Sonar is a security researcher's Swiss army knife for finding and exploiting vulnerabilities that require out-of-band interactions☆21Mar 11, 2026Updated last week
- GitLab CI security tools runner☆18Feb 3, 2023Updated 3 years ago
- NTLMRelay for MS Exchange☆11Nov 13, 2018Updated 7 years ago
- Just a simple SMTP server, implementation of @corpix smtpd library☆15May 8, 2020Updated 5 years ago
- ☆17Jun 8, 2024Updated last year
- Tool to identify routers on the local LAN and paths to the Internet☆68Jan 28, 2024Updated 2 years ago
- oneliner is a tool that gives a list of compatible reverse-shell-string oneliners☆24Jul 30, 2016Updated 9 years ago
- 浏览器XSS 过滤器Fuzzing 框架 (browser xss aduit fuzzing framework )..☆15Sep 13, 2016Updated 9 years ago
- ☆46Mar 20, 2021Updated 5 years ago
- Highlighting different firefox containers in Burp Proxy☆12Dec 4, 2020Updated 5 years ago
- Yet Another Wordlists Repo☆128Jan 6, 2022Updated 4 years ago
- Oyedata is a tool to perform OData assessments☆13Aug 3, 2012Updated 13 years ago
- Fuzzing script for redirect URL validator☆53Feb 4, 2020Updated 6 years ago
- Scrap content from: gelbooru, rule34.xxx, realbooru.com and more.☆15Oct 5, 2024Updated last year
- ☆27Feb 19, 2026Updated last month
- Collection of scripts to test your website against vulnerabilities.☆18Mar 10, 2024Updated 2 years ago
- Python script to give you subsets of the nmap "top-ports". For example, I want the 10th to 100th most common TCP ports. Spits out a comma…☆18Mar 8, 2020Updated 6 years ago
- linuxprivchecker.py -- a Linux Privilege Escalation Check Script☆39Jul 11, 2019Updated 6 years ago
- GraphQL application security testing helper☆20May 22, 2023Updated 2 years ago
- API for Asset Service☆15Aug 15, 2024Updated last year
- A menagerie of insecure and exploitable GitHub Actions workflows and action definitions☆19Oct 16, 2025Updated 5 months ago
- Examples of projects using Arduino and ESP8266☆13Oct 6, 2014Updated 11 years ago
- SAP penetration testing Web and network cheatsheet☆17May 15, 2022Updated 3 years ago
- Security checks pack for Burp Suite☆140Feb 8, 2018Updated 8 years ago
- [CVE-2020-14882] Oracle WebLogic Server Authenticated Remote Code Execution (RCE)☆13Nov 9, 2020Updated 5 years ago
- Bash Enumeration Script☆18Oct 18, 2019Updated 6 years ago
- This automation protect against subdomain takeover on AWS env which also send alerts on slack.☆12Aug 1, 2021Updated 4 years ago
- Tool for catching and logging different types of requests.☆220Nov 20, 2020Updated 5 years ago
- Collection of F-Droid repositories☆17Nov 23, 2023Updated 2 years ago
- An implementation of the DNS rebinding attack.☆16Apr 14, 2017Updated 8 years ago
- Materials for OWASP presentation on malicious JavaScript☆16Aug 30, 2010Updated 15 years ago
- PoC of using Directus as ASPM☆12May 31, 2024Updated last year
- ActionScript Proof of Concept to perform cross-domain reads☆16Aug 26, 2013Updated 12 years ago
- An Instagram UI recreation in Android with slight customizations like curved bottom nav and new profile look.☆37Mar 28, 2020Updated 5 years ago
- Writing Radare2 plugins in various languages☆18Mar 13, 2026Updated last week
- Test for leaking DNS queries (i.e. if you're on a VPN)☆21May 19, 2014Updated 11 years ago
- ☆47Jun 3, 2020Updated 5 years ago
- ☆19Jan 1, 2021Updated 5 years ago