Java Android Magisk Burp Objection Root Emulator Easy (JAMBOREE)
☆257Feb 4, 2026Updated last month
Alternatives and similar repositories for Java-Android-Magisk-Burp-Objection-Root-Emulator-Easy
Users that are interested in Java-Android-Magisk-Burp-Objection-Root-Emulator-Easy are comparing it to the libraries listed below
Sorting:
- Scan your computer for known vulnerable and known malicious Windows drivers using loldrivers.io☆92Dec 2, 2025Updated 3 months ago
- This is a Burp Suite extension that allows users to easily add web addresses to the Burp Suite scope.☆97Jan 2, 2025Updated last year
- A very vulnerable implementation of a GraphQL API.☆61Nov 12, 2021Updated 4 years ago
- ☆88Feb 4, 2026Updated last month
- Portable frida injector for rooted android devices.☆208Jul 24, 2023Updated 2 years ago
- Attempt zone transfers on domains☆18Jul 12, 2021Updated 4 years ago
- Bloodhound Portable for Windows☆53Apr 1, 2023Updated 2 years ago
- Standalone Windows tool to automatically retrieve Sysinternals' AD Explorer search output from the ListView control and save/copy to clip…☆38Apr 12, 2016Updated 9 years ago
- Multi-threading wget golang☆13Mar 13, 2024Updated last year
- Snapshots of GNOME3 apps (for those who hate libadwaita's nonsense): baobab, gnome-system-monitor, and simple-scan... with GTK3 support!☆12Updated this week
- Red Team Coin for crypto-mining operations.☆23Updated this week
- aws cli pentesting/red team snippets☆32Jan 12, 2024Updated 2 years ago
- Tool to detect and monitor GitHub org users' public repositories for secrets and sensitive files☆229Feb 25, 2026Updated last week
- Wireshark RDP resources☆221Jun 2, 2025Updated 9 months ago
- BOR - Break On Request, is a burp extension that provides a custom context menu for marking requests to be stopped by the interceptor wit…☆13Nov 18, 2022Updated 3 years ago
- CVE-2024-30056 Microsoft Edge (Chromium-based) Information Disclosure Vulnerability☆17May 27, 2024Updated last year
- Comprehensive toolkit for Ghidra headless.☆363Apr 17, 2025Updated 10 months ago
- JADX-gui scripting plugin for dynamic decompiler manipulation☆719Feb 5, 2024Updated 2 years ago
- Work in progress...☆407Feb 24, 2026Updated last week
- recon.cloud is website that scans AWS, Azure and GCP public cloud footprint this GO tool only utilize its API for getting result to termi…☆25Feb 11, 2023Updated 3 years ago
- ☆105Jan 3, 2023Updated 3 years ago
- A simple tool to allows users to search for and analyze android apps for potential security threats and vulnerabilities☆87Apr 4, 2024Updated last year
- Rooting Android Studio Emulator with Android Version 9.0 and above☆53Jan 12, 2021Updated 5 years ago
- ☆109Feb 21, 2023Updated 3 years ago
- ☆11Feb 14, 2023Updated 3 years ago
- Provides an overview of the inner file structure of a PDF☆24Sep 26, 2022Updated 3 years ago
- A simple tool that helps to find assets/domains based on the Google Analytics ID.☆179Jan 12, 2026Updated last month
- Create an outbound stream over a message transport.☆21Jun 16, 2025Updated 8 months ago
- Damn Vulnerable ElectronJS App (DVEA)☆17Feb 12, 2026Updated 3 weeks ago
- ☆19Mar 4, 2023Updated 3 years ago
- Command-line tool to enumerate top-level domains, check response codes and find potential vulnerabilities for bug bounty hunters and secu…☆26Mar 6, 2023Updated 3 years ago
- Simple Secure Static (HTTPS) File Server with embedded certificate☆46Apr 9, 2023Updated 2 years ago
- ☆65Dec 9, 2021Updated 4 years ago
- Lena's scripts/code/resources for malware analysis☆26Jun 13, 2024Updated last year
- whoareyou is a tool to find the underlying technology/software used in a list of websites passed through stdin (using Wappalyzer dataset)☆32Jun 15, 2020Updated 5 years ago
- ☆29May 16, 2023Updated 2 years ago
- Extracting unpacked dec files from running application using frida.☆44Apr 16, 2023Updated 2 years ago
- The process involves downloading the latest version and automatically configuring it within the Termux Android application. Subsequently,…☆19Aug 1, 2025Updated 7 months ago
- ☆20Mar 21, 2024Updated last year