joswr1ght / MobileAppReportCardView external linksLinks
Microsoft Excel spreadsheets for consistent security evaluation of Android and iOS mobile applications
☆50Sep 23, 2015Updated 10 years ago
Alternatives and similar repositories for MobileAppReportCard
Users that are interested in MobileAppReportCard are comparing it to the libraries listed below
Sorting:
- Reflective/DOM XSS scanner built on casperJS☆81Oct 21, 2014Updated 11 years ago
- Standalone Windows tool to automatically retrieve Sysinternals' AD Explorer search output from the ListView control and save/copy to clip…☆38Apr 12, 2016Updated 9 years ago
- ☆17Mar 3, 2018Updated 7 years ago
- Presentation Slides☆26Jun 7, 2019Updated 6 years ago
- Duo MFA auditing tool to test users' likelihood of approving unexpected push notifications☆13Apr 20, 2018Updated 7 years ago
- Semgrep rules to identify GWT attack surface☆12Apr 28, 2022Updated 3 years ago
- ☆11Aug 2, 2016Updated 9 years ago
- Some vulnerability research slides that I made☆12Jan 5, 2022Updated 4 years ago
- Distributed password cracker for operating over high latency networks of loosely coupled hosts.☆13Jul 30, 2013Updated 12 years ago
- Set of security tools that can be integrated in Jenkins pipelines.☆18Sep 19, 2019Updated 6 years ago
- Command line tool for analyzing .json files generated by bloodhound.py or sharphound for use in Bloodhound.☆20Jan 12, 2019Updated 7 years ago
- BOR - Break On Request, is a burp extension that provides a custom context menu for marking requests to be stopped by the interceptor wit…☆13Nov 18, 2022Updated 3 years ago
- Tool for inspecting Windows Phone applications☆28Jun 7, 2013Updated 12 years ago
- ☆13Apr 8, 2022Updated 3 years ago
- The best way to learn Frida, is practicing. This is an example of scripts to use in a practical workshop.☆28Jun 13, 2017Updated 8 years ago
- A tool to assist in the development of landing pages for phishing campaigns☆16Oct 3, 2022Updated 3 years ago
- B-Sides CBR 2018 talk about group policy and Grouper☆38May 3, 2019Updated 6 years ago
- Command line tool that enables automated penetration testing in the Microsoft stack using OWASP ZAP☆20Feb 22, 2015Updated 10 years ago
- Windows Privesc Check☆20May 20, 2014Updated 11 years ago
- BugBounty framework with main function to ORGANIZE data and STEPS. So, you don't get lost in your bug bounty hunting. You can find everyt…☆14Jul 8, 2018Updated 7 years ago
- Service desk password tools.☆16Apr 21, 2017Updated 8 years ago
- A Python package to search & delete messages from mailboxes in Office 365 using Microsoft Graph API☆25Feb 15, 2022Updated 3 years ago
- A project designed to parse public source code repositories and find various types of vulnerabilities.☆193Oct 6, 2017Updated 8 years ago
- Fingerprint a web app using local files as the fingerprint sources☆38May 16, 2017Updated 8 years ago
- Demo server for testing Java deserialization payloads☆15Sep 18, 2016Updated 9 years ago
- A utility for password spraying using kerberos from an untrusted/non-domain joined Kali linux host. Useful for user and KDC/DC enumeratio…☆19Oct 28, 2023Updated 2 years ago
- FirePrint is a security tool for finding misconfigured Firebase realtime databases in Android or iOS applications.☆22Apr 4, 2024Updated last year
- SubdomainDB is a simple self-hosted API that allows you to maintain your own subdomain database.☆31Jan 8, 2018Updated 8 years ago
- CloudBurst is a red team framework for interacting with cloud providers to capture, compromise, and exfil data.☆37Aug 30, 2018Updated 7 years ago
- VyAPI - A cloud based vulnerable hybrid Android App☆86Feb 21, 2020Updated 5 years ago
- gathers the XSS cheatsheet payloads and creates a usable wordlist☆74Jan 4, 2021Updated 5 years ago
- bash script to facilitate some aspects of an Android application assessment☆160Sep 9, 2021Updated 4 years ago
- This extension replaces the default repeater tab name with the URL path of the repeater request.☆24Sep 3, 2021Updated 4 years ago
- Repository which contains a set of examples used in real phishing emails. Numerous parts of these examples will be highlighted to illustr…☆17Aug 18, 2021Updated 4 years ago
- Short and simple vulnerable PHP web application that naïve scanners found to be perfectly safe☆14Dec 4, 2015Updated 10 years ago
- Security tools to use on assessments.☆40May 9, 2016Updated 9 years ago
- HTML source files demonstrating HTML5 postmessage vulnerabilities☆20Jul 26, 2020Updated 5 years ago
- Quick Start/Setup of CI/CD for Offensive/Defensive Purposes☆21Sep 4, 2021Updated 4 years ago
- Checklist intended to be used as a baseline for assessing, designing, and testing the security of a MAM (Application Wrapping) solution☆20Sep 2, 2015Updated 10 years ago