fs0c131y / ConPresentationsLinks
Slide decks from my conference presentations
☆34Updated 5 years ago
Alternatives and similar repositories for ConPresentations
Users that are interested in ConPresentations are comparing it to the libraries listed below
Sorting:
- Samsung ContainerAgent Vulnerability - Local DoS for Samsung smartphone☆70Updated 6 years ago
- Created by High-Tech Bridge, the Purposefully Insecure and Vulnerable Android Application (PIVAA) replaces outdated DIVA for benchmark of…☆108Updated 5 years ago
- ☆18Updated last year
- Collection of Android security related resources☆103Updated last year
- An open source Android application that is intentionally vulnerable so as to act as a learning platform for Android application security …☆221Updated 3 years ago
- HTML form parser for humans.☆79Updated 5 years ago
- Easy to use APK/IPA Mobile App Inspector☆77Updated 3 years ago
- A ping detection tool for linux☆24Updated 5 years ago
- Covid19 Tracker Apps☆67Updated 4 years ago
- Some random scripts. Just trying to be like the cool kids.☆93Updated 7 years ago
- From this app, Connect a Phone, Extract any app from It, Decompile, Deobfuscate, Remove Certificate Pinning and Repackage it. Meanwhile, …☆27Updated last week
- Script to find a keyword in your Twitter follower screen names☆37Updated 6 years ago
- bash script to facilitate some aspects of an Android application assessment☆158Updated 3 years ago
- A tool that enumerates Android devices for information useful in understanding its internals and for exploit development. It supports and…☆53Updated 7 years ago
- ☆120Updated 6 years ago
- (Abandoned) Extract packages from an Android device☆51Updated 4 years ago
- Bodhi - Client-side Vulnerability Playground☆121Updated 4 years ago
- A collection of CTF solution types, i.e. not solutions to specific CTF challenges, but the general categories that those solutions fall u…☆57Updated 3 years ago
- ☆94Updated 7 years ago
- VyAPI - A cloud based vulnerable hybrid Android App☆85Updated 5 years ago
- Exploiting misconfigured firebase databases☆124Updated 6 years ago
- CPH:SEC - Copenhagen Ethical Hacking and Penetration Testing Society☆43Updated 2 years ago
- HTML5 Training material for Attack and Secure training sessions.☆43Updated 2 years ago
- We Use Github Extensively and openly. So it becomes dificult to track what's what and what's where. This repository is a master repo to H…☆138Updated 2 years ago
- A tool for finding and analyzing private (and public) key files, including support for Android APK files.☆273Updated 2 years ago
- MalQR is a collection of malicious QR Codes and Barcodes you can use to test the security of your scanners.☆125Updated last year
- Cryptovenom: The Cryptography Swiss Army Knife☆1Updated 4 years ago
- Determine everything you need to know to about a system☆32Updated 6 years ago
- Command-line tool using Shodan API. Generates and downloads CSV results, diffing of historic scanning results, alerts and monitoring of s…☆66Updated 6 years ago
- InsideVuln [Inside Vulnerabilities] : Python script to detect vulnerabilities into a PHP source code using statical analysis, based on re…☆8Updated 6 years ago