Search security keys, domains, ip addresses in the APK project. You can also add to the search terms. If it finds leak data, you can have it tested automatically with the command you give.
☆18Nov 1, 2022Updated 3 years ago
Alternatives and similar repositories for APKLeakData
Users that are interested in APKLeakData are comparing it to the libraries listed below
Sorting:
- SOC bilgileri yer almaktadır.☆22Jul 2, 2025Updated 8 months ago
- ☆13Mar 23, 2023Updated 2 years ago
- ☆21Aug 3, 2022Updated 3 years ago
- OSINT tool for domain discovery☆10Apr 5, 2024Updated last year
- ☆11Feb 28, 2022Updated 4 years ago
- BlackHeart is a simple python script to generate powershell scripts that demonstrate reverse shell gaining without Microsoft Defender res…☆34Apr 9, 2024Updated last year
- ☆44Sep 25, 2025Updated 5 months ago
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆33May 1, 2022Updated 3 years ago
- Simple implementation of an AppSec Pipeline using the Gasp library☆13Sep 8, 2019Updated 6 years ago
- Minimum DevSecOps with Monitoring Options on Amazon EKS☆13Feb 25, 2026Updated last week
- Calculate the domain age with python script☆11Mar 27, 2018Updated 7 years ago
- This project provides an AI-driven test case generator using FastAPI. The application accepts a GitHub repository name and generates test…☆19Jun 7, 2024Updated last year
- ☆10May 12, 2022Updated 3 years ago
- A curated list of GPT agents for cybersecurity☆12Oct 2, 2024Updated last year
- HOCig- Automatic HOC Information Gathering Tool V 1.2☆10May 4, 2021Updated 4 years ago
- Sample queries for Advanced hunting in Windows Defender ATP☆11Apr 22, 2020Updated 5 years ago
- repository containing some nmap scripts☆16Jan 15, 2021Updated 5 years ago
- Burp Enterprise Toolkit☆12Feb 25, 2022Updated 4 years ago
- A tiny GitHub searcher using the GitHub API. No authentication required.☆12May 2, 2025Updated 10 months ago
- ☆11Nov 5, 2025Updated 4 months ago
- ☆11Mar 29, 2022Updated 3 years ago
- ☆10Dec 19, 2024Updated last year
- This "Automotive Cybersecurity Career Roadmap" is tailored for individuals aspiring to build expertise in automotive cybersecurity.☆21Jan 3, 2025Updated last year
- A tool for generating reverse shell payloads on the fly.☆10Jun 18, 2022Updated 3 years ago
- A curated collection of security tools, frameworks, and resources for Enumeration, Cloud Security, Static Analysis, Threat Intelligence, …☆21Dec 2, 2025Updated 3 months ago
- Scan A2A agents for potential threats and security issues☆120Feb 16, 2026Updated 2 weeks ago
- Repository with some necessary information for you to create your PenTest consultancy☆102Jan 12, 2025Updated last year
- Offensive Terraform module which creates an IAM role with trust relationship with attacker's AWS account and attaches managed IAM Policy …☆12Sep 18, 2020Updated 5 years ago
- Unveiling Cyber Threats: From assets to Vulnerability Insights☆17Oct 22, 2024Updated last year
- A multi scanner for docker images. It drives Clair, Anchore, Trivy, Snyk, Grype, AWS ECR scans and consolidates the results.☆14Jun 23, 2023Updated 2 years ago
- A comprehensive reconnaissance and vulnerability scanning tool that combines multiple security assessment capabilities into a single auto…☆26Jun 24, 2025Updated 8 months ago
- Sentinel Recon Tools Workbook☆14Aug 24, 2022Updated 3 years ago
- Fake Update Website ( On Click Automatic Download Windows Payload )☆11Apr 8, 2020Updated 5 years ago
- automated sticky keys backdoor☆10Feb 12, 2016Updated 10 years ago
- GoPhishReport is a penetration testing and red teaming tool that creates custom phishing campaign reports for GoPhish phishing campaigns …☆13Mar 9, 2024Updated last year
- ☆13Sep 29, 2022Updated 3 years ago
- Tools to work with vulnerability standards.☆19Mar 19, 2014Updated 11 years ago
- Config files for my GitHub profile.☆13Oct 9, 2022Updated 3 years ago
- Python3 script to quickly get various information from a domain controller through his LDAP service.☆11Feb 23, 2022Updated 4 years ago