fs0c131y / ConPresentationsLinks
Slide decks from my conference presentations
☆34Updated 5 years ago
Alternatives and similar repositories for ConPresentations
Users that are interested in ConPresentations are comparing it to the libraries listed below
Sorting:
- VyAPI - A cloud based vulnerable hybrid Android App☆84Updated 5 years ago
- Test Android Application.☆19Updated 9 years ago
- Samsung ContainerAgent Vulnerability - Local DoS for Samsung smartphone☆70Updated 6 years ago
- HTML form parser for humans.☆79Updated 5 years ago
- Created by High-Tech Bridge, the Purposefully Insecure and Vulnerable Android Application (PIVAA) replaces outdated DIVA for benchmark of…☆107Updated 5 years ago
- ☆121Updated 6 years ago
- Exploiting misconfigured firebase databases☆124Updated 6 years ago
- (Abandoned) Extract packages from an Android device☆51Updated 4 years ago
- ☆93Updated 6 years ago
- Easy to use APK/IPA Mobile App Inspector☆76Updated 2 years ago
- Extreme Vulnerable Node Application☆95Updated 6 years ago
- Automating Jenkins Hacking using Shodan API☆94Updated 7 years ago
- Some random scripts. Just trying to be like the cool kids.☆93Updated 6 years ago
- Actarus is a custom tool for bug bounty☆76Updated 5 years ago
- This tool queries the emails that registered the domain and verifies if they were leaked in some data leak.☆67Updated 6 years ago
- A Python3 based single-file subdomain enumerator☆89Updated 5 years ago
- A tool to spider Github or search URLs for various information leaks☆34Updated 2 years ago
- Learning Penetration Testing of Android Applications☆78Updated 7 years ago
- A tool that enumerates Android devices for information useful in understanding its internals and for exploit development. It supports and…☆52Updated 7 years ago
- This tool is for automate the initial things that we usually do in daily pentesting. So you can focus more on the main target.☆75Updated 5 years ago
- A small cli utility for interacting with Hack the Box☆35Updated 2 years ago
- Simple wrapper for meg that sieves through meg's output for you.☆60Updated 5 years ago
- ☆34Updated 4 years ago
- Dashboard containing various recon tools☆14Updated 7 years ago
- ☆20Updated 9 years ago
- Android security labs☆110Updated 5 years ago
- From this app, Connect a Phone, Extract any app from It, Decompile, Deobfuscate, Remove Certificate Pinning and Repackage it. Meanwhile, …☆27Updated last year
- OASAM is the acronym of Open Android Security Assessment Methodology and its purpose is to become a reference framework on Android applic…☆85Updated 3 years ago
- Bodhi - Client-side Vulnerability Playground☆120Updated 4 years ago
- This is a set of tips and reminders for pentesting processes and scripts/programs. Initially for personal use, but if anyone else finds t…☆52Updated 5 years ago