evilsocket / arc-android-wrapperLinks
An Android wrapper for Arc
☆11Updated 7 years ago
Alternatives and similar repositories for arc-android-wrapper
Users that are interested in arc-android-wrapper are comparing it to the libraries listed below
Sorting:
- A tool that enumerates Android devices for information useful in understanding its internals and for exploit development. It supports and…☆54Updated 7 years ago
- ☆20Updated 9 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 8 years ago
- A modular pentesting framework implemented in C☆14Updated 7 years ago
- ☆26Updated 5 years ago
- Tool for automation of GUI-based testing.☆16Updated 10 years ago
- Proof of Concept for CVE-2018-11776☆21Updated 7 years ago
- A brief analysis of the BlueBorne Vulnerability Scanner app by Armis☆23Updated 8 years ago
- A fuzzing script for MitmProxy☆22Updated 10 years ago
- Golang code to crawl website, extract links from html, paths from JavaScript code, follow and repeat.☆12Updated 7 years ago
- A security write-up about the Paypal API & data leakage☆24Updated 9 years ago
- Automated Information Retrieval From APKs For Initial Analysis☆32Updated 7 years ago
- This document proposes a way of standardising the structure, language, and grammar used in security policies.☆25Updated 7 years ago
- Mobile Application Vulnerability Detection☆12Updated 8 years ago
- BLESuite_CLI is a command line tool to enable an easier way to test Bluetooth Low Energy (BLE) devices☆32Updated 9 years ago
- Format string exploit generation☆10Updated 9 years ago
- Dockerised Version of Frida☆21Updated 2 years ago
- Leveraging CVE-2018-19788 without root shells☆19Updated 6 years ago
- Enumerate subdomains through Virustotal☆32Updated 5 years ago
- Local enumeration and exploitation framework.☆18Updated 8 years ago
- A BurpSuite extension for beautifying .NET message parameters and hiding some of the extra clutter that comes with .NET web apps (i.e. __…☆12Updated 10 years ago
- ☆18Updated 6 years ago
- Evil snippets of Underhanded Red Team tactics☆11Updated 8 years ago
- Get detailed information about a Twitter user activity☆17Updated 7 years ago
- ☆11Updated 8 years ago
- Metasploit installer for Debian (Jessie) VPS.☆25Updated 8 years ago
- Framework for static and dynamic analysis in Android APKs☆32Updated 8 years ago
- Example ASM code following SLAE course and exam assignments.☆36Updated 8 years ago
- Break Apps with Frida workshop material☆46Updated 7 years ago
- Modified version of ActiveScan++ Burp Suite extension☆31Updated 8 years ago