fs0c131y / ConPresentationsLinks
Slide decks from my conference presentations
☆34Updated 5 years ago
Alternatives and similar repositories for ConPresentations
Users that are interested in ConPresentations are comparing it to the libraries listed below
Sorting:
- Samsung ContainerAgent Vulnerability - Local DoS for Samsung smartphone☆70Updated 6 years ago
- VyAPI - A cloud based vulnerable hybrid Android App☆84Updated 5 years ago
- Test Android Application.☆19Updated 9 years ago
- A ping detection tool for linux☆24Updated 5 years ago
- A tool that enumerates Android devices for information useful in understanding its internals and for exploit development. It supports and…☆53Updated 7 years ago
- HTML form parser for humans.☆79Updated 5 years ago
- Learning Penetration Testing of Android Applications☆78Updated 7 years ago
- Collection of Android security related resources☆102Updated last year
- Created by High-Tech Bridge, the Purposefully Insecure and Vulnerable Android Application (PIVAA) replaces outdated DIVA for benchmark of…☆107Updated 5 years ago
- How to steal FaceApp photos☆38Updated 5 years ago
- ☆121Updated 6 years ago
- Dashboard containing various recon tools☆14Updated 7 years ago
- Download content of an open bucket☆16Updated 5 years ago
- A tool to exploit imagetragick vulnerability to gain remote code execution☆20Updated 7 years ago
- A tool to spider Github or search URLs for various information leaks☆34Updated 2 years ago
- Tool for sniffing Recent activity as well as payload of SMS and future types of communications on Android devices.☆30Updated 11 years ago
- Social Network Tabs Wordpress Plugin Vulnerability - CVE-2018-20555☆73Updated 4 years ago
- Bodhi - Client-side Vulnerability Playground☆120Updated 4 years ago
- Some random scripts. Just trying to be like the cool kids.☆93Updated 6 years ago
- Exploiting misconfigured firebase databases☆124Updated 6 years ago
- ☆18Updated last year
- Penetration testing and auditing toolkit for Android apps.☆240Updated 3 months ago
- DumpTheGit searches through public repositories to find sensitive information uploaded to the Github repositories.☆86Updated 6 years ago
- From this app, Connect a Phone, Extract any app from It, Decompile, Deobfuscate, Remove Certificate Pinning and Repackage it. Meanwhile, …☆27Updated last year
- ☆27Updated 4 years ago
- (Abandoned) Extract packages from an Android device☆51Updated 4 years ago
- ☆93Updated 6 years ago
- Network based protocol fuzzer☆71Updated 3 years ago
- Hunt Open MongoDB instances☆79Updated 5 years ago
- ☆42Updated 6 years ago