Tool for viewing Android package details, including permissions, services, activities, and more.
☆22Nov 30, 2012Updated 13 years ago
Alternatives and similar repositories for package-play
Users that are interested in package-play are comparing it to the libraries listed below
Sorting:
- A tool for viewing Android application Manifests.☆54May 15, 2022Updated 3 years ago
- Make any application debuggable☆134Dec 14, 2013Updated 12 years ago
- Bypass signature and permission checks for IPCs☆85Dec 19, 2013Updated 12 years ago
- KTRR bypass for iPhone 7 (10.0 - 10.1.1) - http://yalu.qwertyoruiop.com/y7.txt☆11Mar 17, 2018Updated 8 years ago
- ☆11Aug 11, 2014Updated 11 years ago
- [unmaintained] Modern project template for Python [2010]☆52Dec 7, 2010Updated 15 years ago
- AWS EC2 and S3 Security Auditing Tool☆41Feb 19, 2014Updated 12 years ago
- iOS 12.0 -> 12.1.2 _kernproc and _rootvnode offsets for 16K devices☆11Feb 15, 2019Updated 7 years ago
- A demo of using Octokit.net with the OAuth web flow☆18Dec 1, 2017Updated 8 years ago
- FateGo Jailbreak Detection Bypass(W.I.P)☆15Sep 24, 2020Updated 5 years ago
- Automated F5 Big IP Remote Code Execution (CVE-2020-5902) Scanner Written In Python 3☆12Dec 17, 2021Updated 4 years ago
- A test framework for testing SSL/TLS client certificate validation.☆94Sep 14, 2021Updated 4 years ago
- iOS platform security & anti-tampering Swift library☆18Sep 2, 2021Updated 4 years ago
- A Darktrace CLI written in Python☆16Nov 28, 2019Updated 6 years ago
- Coleção de informações sobre POS's disponíveis no mercado Brasileiro, com propósito educativo.☆11Sep 6, 2020Updated 5 years ago
- Linux deniable cryptographic storage eraser based on hardware USB trigger for self-destruction in a case of emergency☆12Apr 16, 2020Updated 5 years ago
- ☆12Jun 12, 2021Updated 4 years ago
- The Dirty Secrets They Didn't Teach You In Pentesting Class☆13Oct 5, 2011Updated 14 years ago
- Collection of Vulnerable Websites containing File Upload Vulnerability for practicing skill☆13Jun 6, 2022Updated 3 years ago
- ☆12May 6, 2019Updated 6 years ago
- Some helpful things for AVR☆16Jan 23, 2018Updated 8 years ago
- Gem in a Box, secured and audited.☆10Jan 4, 2018Updated 8 years ago
- A tool for Pentesters & BugHunters to collect IPs of company, server, Operating System & many more☆13Dec 20, 2022Updated 3 years ago
- The Mobile App Pentest cheat sheet was created to provide concise collection of high value information on specific mobile application pen…☆16Apr 11, 2017Updated 8 years ago
- A multi-codec media fuzzing tool.☆43Oct 9, 2012Updated 13 years ago
- UEFI keylogger prototype☆10May 10, 2017Updated 8 years ago
- Bug Bounty Monitor☆15Nov 23, 2020Updated 5 years ago
- ☆13Apr 8, 2019Updated 6 years ago
- docker build nessus with unlimited ip☆13Aug 23, 2021Updated 4 years ago
- Some guides about general topics on information security☆13Mar 19, 2019Updated 7 years ago
- a tool for generating a smali-debugable project from a apk file☆26Dec 18, 2017Updated 8 years ago
- Silensec's Nyuki Forensics Investigator (Mobile Forensics)☆46Aug 18, 2017Updated 8 years ago
- NetScan is a Network Reconnaissance Tool for Windows/Linux/OSx etc Written in Python 3.☆22Jan 10, 2021Updated 5 years ago
- An automatic Bot that generates and checks Fortnite gift codes.☆10Jan 9, 2021Updated 5 years ago
- Collection of materials related to IBM z/OS security☆45Dec 14, 2015Updated 10 years ago
- An iOS developer framework for rootless tweak development.☆32Nov 12, 2023Updated 2 years ago
- A brute-forcing delta robot☆28Sep 17, 2014Updated 11 years ago
- File system enumerator and monitor for Android and Ubuntu.☆17Sep 25, 2021Updated 4 years ago
- Notifications when metasploit msf session up or down in telegram.☆11Feb 20, 2018Updated 8 years ago