hahwul / droid-hunterLinks
(deprecated) Android application vulnerability analysis and Android pentest tool
☆289Updated 6 years ago
Alternatives and similar repositories for droid-hunter
Users that are interested in droid-hunter are comparing it to the libraries listed below
Sorting:
- Intercept, modify, repeat and attack Android's Binder transactions using Burp Suite☆321Updated 7 years ago
- Penetration testing and auditing toolkit for Android apps.☆240Updated 3 months ago
- We Use Github Extensively and openly. So it becomes dificult to track what's what and what's where. This repository is a master repo to H…☆134Updated 2 years ago
- Mobile application testing toolkit☆241Updated 6 years ago
- Droidefense: Advance Android Malware Analysis Framework☆481Updated 2 years ago
- Bluetooth scanner for local devices that may be vulnerable to Blueborne exploit☆152Updated 7 years ago
- ☆93Updated 6 years ago
- Exploits and Security Tools Framework 2.0.1☆306Updated 2 years ago
- bash script to facilitate some aspects of an Android application assessment☆158Updated 3 years ago
- Android Emulator for mobile security testing☆227Updated 3 years ago
- Android Framework for Exploitation, is a framework for exploiting android based devices☆191Updated 9 years ago
- *This project is no longer maintained* OWASP GoatDroid is a fully functional and self-contained training environment for educating develo…☆243Updated 10 years ago
- Metasploit AV Evasion Tool☆260Updated 9 years ago
- Embed a Metasploit Payload in an Original .Apk File☆117Updated 4 years ago
- Linux tool used to extract sensitive data, inject backdoor or drop remote shells on android devices.☆107Updated 9 years ago
- The Mobile App Pentest cheat sheet was created to provide concise collection of high value information on specific mobile application pen…☆286Updated 7 years ago
- Various Scripts for Mobile Pen-testing with Frida☆76Updated 9 years ago
- search for hosts info with shodan☆230Updated 4 years ago
- Python tool that generates an Xmind map with all the information gathered and any evidence of possible vulnerabilities identified via sta…☆124Updated 6 years ago
- My collection of metasploit auxiliary post-modules☆191Updated 6 years ago
- Automates some pentest jobs via nmap xml file☆323Updated 6 years ago
- A Burp Suite content discovery plugin that add the smart into the Buster!☆383Updated 4 years ago
- Meterpreter Paranoid Mode - SSL/TLS connections☆286Updated 6 years ago
- The Hacker's ToolBox☆188Updated 7 years ago
- Damn Vulnerable Hybrid Mobile App (DVHMA) is an hybrid mobile app (for Android) that intentionally contains vulnerabilities.☆267Updated 6 years ago
- Android APK analyzer based on radare2 and others.☆154Updated 5 years ago
- Linux bash script automation for metasploit☆265Updated 5 years ago
- Bash script purposed for system enumeration, vulnerability identification and privilege escalation.☆166Updated 5 years ago
- A Bash script that downloads and unzips scripts that will aid with privilege escalation on a Linux system.☆493Updated 3 years ago
- Terminator metasploit payload generator☆179Updated 7 years ago