Repository for the Smartphone Pentest Framework (SPF)
☆456Mar 23, 2017Updated 8 years ago
Alternatives and similar repositories for Smartphone-Pentest-Framework
Users that are interested in Smartphone-Pentest-Framework are comparing it to the libraries listed below
Sorting:
- A blind SQL injection module that uses bitshfting to calculate characters.☆132Aug 7, 2022Updated 3 years ago
- A Blind SQL Exploitation application☆79Jul 31, 2012Updated 13 years ago
- Android Device Testing Framework ("dtf")☆85Dec 26, 2022Updated 3 years ago
- Automatically exported from code.google.com/p/cms-explorer☆23Mar 30, 2015Updated 10 years ago
- ☆17Jul 8, 2021Updated 4 years ago
- The ONLY hacker friendly proxy for webapp pentests.☆221Nov 29, 2016Updated 9 years ago
- A book about how to conduct digital forensic investigations with free and open source tools.☆12Apr 30, 2014Updated 11 years ago
- Password cracking utility☆54Apr 6, 2021Updated 4 years ago
- Maltego Penetration Testing Transforms☆381Oct 15, 2019Updated 6 years ago
- bash script to help you , doing many penetration testing based on kali linux , help pentester and hackers to deal with kali linux in easy…☆18Apr 12, 2015Updated 10 years ago
- A script made to validate numerous cryptographic-related vulnerabilities such as: Heartbleed, Logjam, CRIME,POODLE, DROWN, Weak Cipher Su…☆19Jul 25, 2016Updated 9 years ago
- WeakNet PHP Execution Shell☆31Oct 14, 2015Updated 10 years ago
- The Penetration Testers Framework (PTF) is a way for modular support for up-to-date tools.☆5,498Sep 22, 2024Updated last year
- Botnet monitoring is a crucial part in threat analysis and often neglected due to the lack of proper open source tools. Our tool will pro…☆81Jun 4, 2013Updated 12 years ago
- XSS Tunnel is a standard HTTP proxy which sits on an attacker’s system. XSS Shell is a powerful XSS backdoor, in XSS Shell one can inter…☆88Jan 27, 2015Updated 11 years ago
- Python tools for penetration testers☆2,862Apr 14, 2025Updated 11 months ago
- GoPhish is a phishing script that enables rapid deployment of phishing sites.☆29Sep 13, 2018Updated 7 years ago
- The official repo of BSIS☆14Feb 16, 2012Updated 14 years ago
- A semi fast tool to bruteforce values of LDAP injections over HTTP.☆14Dec 4, 2013Updated 12 years ago
- Useful pentesting scripts☆86Feb 1, 2025Updated last year
- Scripts that are useful for me on pen tests☆538Jun 8, 2022Updated 3 years ago
- Universal stack-based buffer overfow exploitation tool☆23May 7, 2014Updated 11 years ago
- A collection of post-exploitation tools for network red teaming.☆138Dec 7, 2018Updated 7 years ago
- Getting BlindElephant into a working state, and updating the plugin files☆80Sep 2, 2020Updated 5 years ago
- LNHG - Mass Web Fingerprinter☆63Feb 22, 2016Updated 10 years ago
- ☆128Jun 12, 2015Updated 10 years ago
- MeterSSH is a way to take shellcode, inject it into memory then tunnel whatever port you want to over SSH to mask any type of communicati…☆526Apr 13, 2017Updated 8 years ago
- SQL Injection Exploitation Tool☆811Jan 4, 2019Updated 7 years ago
- Easy Window domain access☆51Apr 3, 2014Updated 11 years ago
- Veil Evasion is no longer supported, use Veil 3.0!☆1,841Sep 24, 2021Updated 4 years ago
- Big Iron Recon & Pwnage☆125Nov 8, 2021Updated 4 years ago
- Automates some pentest jobs via nmap xml file☆325Sep 7, 2018Updated 7 years ago
- Searches for interesting cached DNS entries.☆56May 15, 2014Updated 11 years ago
- A Network Inspection Tool☆82Oct 13, 2017Updated 8 years ago
- A better SSL cipher checker using gnutls☆28May 17, 2017Updated 8 years ago
- Advanced HTTP fingerprinting PoC☆45Mar 27, 2017Updated 8 years ago
- application server attack toolkit☆687Apr 6, 2020Updated 5 years ago
- Yet another AV evasion tool☆117Jan 3, 2022Updated 4 years ago
- Pastenum is a text dump enumeration tool.☆14Dec 9, 2013Updated 12 years ago