hakaioffsec / BEERUSLinks
☆13Updated last year
Alternatives and similar repositories for BEERUS
Users that are interested in BEERUS are comparing it to the libraries listed below
Sorting:
- BlueStacks privilege escalation through VM backdooring☆21Updated last year
- Detect code obfuscation through text classification in the detection process.☆44Updated last year
- A tool capable of bypassing easy root detection mechanisms by patching applications automatically (without frida).☆33Updated last year
- aiohttp LFI (CVE-2024-23334)☆27Updated last year
- Unauthorized Access to Metadata and User Data like CTF☆28Updated last year
- Exfiltrate sensitive user data from apps on Android 12 and 13 using CVE-2024-0044 vulnerability remotely☆75Updated last year
- Scripts to set up your own Android 📱 app hacking lab☆94Updated last year
- POC for CVE-2024-31982: XWiki Platform Remote Code Execution > 14.10.20☆10Updated last year
- exploits for CVE-2024-20017☆141Updated last year
- ModTracer Finds Hidden Linux Kernel Rootkits and then make visible again.☆87Updated 9 months ago
- A simple tool to allows users to search for and analyze android apps for potential security threats and vulnerabilities☆88Updated last year
- hiding in plain sight: part 2☆45Updated last year
- Android App Pin Security Issue Allowing Unauthorized Payments via Google Wallet☆73Updated last year
- Windows And Ways To Break It☆101Updated 2 years ago
- This repository hosts PoC exploits for vulnerabilities I've discovered, provided for education and to highlight the importance of system …☆19Updated 2 years ago
- DNS over HTTPS targeted malware (only runs once)☆96Updated 2 years ago
- MobSF Remote code execution (via CVE-2024-21633)☆80Updated last year
- This Python-based GUI application allows you to track the latest security vulnerabilities (CVEs) using the☆39Updated 8 months ago
- Make an Linux Kernel rootkit visible again.☆60Updated 9 months ago
- 「🧱」Test a list of payloads and see if you can bypass it☆61Updated 3 years ago
- JoomSploit is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's critical…☆29Updated last year
- SSH Private Key Looting Wordlists. A collection of wordlists to aid in locating or brute-forcing SSH private key file names.☆45Updated last year
- ZTE F660 Routers Authentication Bypass Leading to RCE.☆19Updated last year
- A complete security assessment tool that supports common web security issues scanning and custom POC | Be sure to read the document befor…☆20Updated last year
- An intentionally vulnerable Android Application to demonstrate various vulnerabilities that airses in Android Components.☆39Updated 8 months ago
- Stuxnet extracted binaries by reversing & Stuxnet Rootkit Analysis☆77Updated last year
- This tool generates an undetectable Windows reverse shell PowerShell script. Users can configure IP and Port according to their requireme…☆18Updated last year
- Lena's scripts/code/resources for malware analysis☆26Updated last year
- mapAccountHijack is a tool designed to carry out a MAP Account hijack attack, which exploits the Message Access Profile (MAP) in Bluetoot…☆56Updated 10 months ago
- PrestaXSRF is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's critical…☆31Updated last year