☆21Mar 7, 2024Updated last year
Alternatives and similar repositories for android-challenge1
Users that are interested in android-challenge1 are comparing it to the libraries listed below
Sorting:
- A script to test for subdomain takeovers from a list of domains☆12Feb 18, 2023Updated 3 years ago
- ☆20Sep 6, 2023Updated 2 years ago
- 🗂 Knowledge Base on the Security of Chromium Extensions (https://extensions.neplox.security)☆19Jan 24, 2025Updated last year
- Chiron Unpacker, developed by the Malwation MTR Team, is an Unpacker for Packers using the Assembly.Load function.☆22Oct 10, 2024Updated last year
- ☆19Nov 25, 2025Updated 3 months ago
- Nuclei plugins to audit Chrome extensions☆65Jul 16, 2024Updated last year
- A Magisk module that simplifies running the Frida server on Android, with easy management commands to download specific versions, enable …☆31Apr 27, 2025Updated 10 months ago
- Demonstrates how a malicious dependency could negatively impact the build output.☆25Aug 11, 2023Updated 2 years ago
- Encode and Fuzz Custom Protobuf Messages in Burp Suite☆36Mar 4, 2025Updated 11 months ago
- A simple Meterpreter stager written in Rust.☆45Nov 2, 2025Updated 4 months ago
- ☆12Jan 2, 2023Updated 3 years ago
- ☆30Jun 27, 2022Updated 3 years ago
- ☆13Jan 16, 2023Updated 3 years ago
- Scan your account for the use of untrusted AMIs☆31Feb 13, 2026Updated 2 weeks ago
- Manjaro LPE☆34Jul 6, 2023Updated 2 years ago
- GitHub Entreprise Server SAML authentication bypass (CVE-2025-23369) exploit☆38Feb 8, 2025Updated last year
- Automated management of ad campaigns in Google Display&Video 360.☆14Feb 9, 2026Updated 3 weeks ago
- A penetration testing tool for odoo applications.☆75Jan 17, 2026Updated last month
- This AppEngine sample application is designed to process your Waze CCP JSON Feed into; BigQuery GIS tables for analysis, Google Cloud Sto…☆11Dec 12, 2023Updated 2 years ago
- Mishky's AD Range & The Escalation Path from Hell, Version 1.1☆11May 7, 2025Updated 9 months ago
- ☆10May 12, 2022Updated 3 years ago
- ☆19Jul 14, 2025Updated 7 months ago
- A secrets manager in times of crypto coins.☆11Dec 22, 2025Updated 2 months ago
- GPO Bypass is a tool / proof-of-concept that highlights how one can bypass Group Policy enforced policies. It uses Firefox as an example.☆14Jan 28, 2023Updated 3 years ago
- The main repo for the O3 wallet on iOS☆10Jul 28, 2020Updated 5 years ago
- Simple Command Line Tool to Enumerate Slack Workspace Names from Slack Webhook URLs.☆41Dec 12, 2023Updated 2 years ago
- Make better use of the embedded browser that comes by default with Burp☆43Jan 1, 2024Updated 2 years ago
- Challenges I wrote for various CTF competitions☆44Jul 21, 2024Updated last year
- Automation of KNOXSS extension.☆11Apr 12, 2019Updated 6 years ago
- OWASP Foundation Web Respository☆11Jan 14, 2026Updated last month
- Top 2025 Vulnerabilities You Shouldn’t Accept in a Pentest Report☆14Feb 6, 2025Updated last year
- CVE-2025-64155: Fortinet FortiSIEM Argument Injection to Remote Code Execution☆31Jan 13, 2026Updated last month
- Radix Primitives Cheatsheet☆12Mar 11, 2022Updated 3 years ago
- Buddies of Budgie documentation, built with Docusaurus.☆12Feb 7, 2026Updated 3 weeks ago
- ☆14Sep 1, 2024Updated last year
- CSS injection requires an attacker to load a standalone CSS file to leak HTML tag attributes.☆20Apr 19, 2024Updated last year
- ☆11Dec 26, 2023Updated 2 years ago
- Proof of concept about the privilege escalation flaw identified in Google's Osconfig☆10Sep 20, 2020Updated 5 years ago
- Floating Islands open standards and documentation☆10Jul 31, 2018Updated 7 years ago