justmobilesec / just-mobile-security-mobile-dockerLinks
☆26Updated 2 weeks ago
Alternatives and similar repositories for just-mobile-security-mobile-docker
Users that are interested in just-mobile-security-mobile-docker are comparing it to the libraries listed below
Sorting:
- Automated iOS Frida Gadget injection and Testflight deployment using Frida and Fastlane☆14Updated 2 years ago
- ☆22Updated 2 years ago
- ☆21Updated 4 months ago
- Exploit POC for CVE-2024-22026 affecting Ivanti EPMM "MobileIron Core"☆15Updated last year
- External Playbooks for Public Access☆41Updated last year
- "Terrible Thick Client" is a vulnerable application developed in C# .NET framework.☆20Updated 2 years ago
- damn-exploitable-android-app-apk☆40Updated 2 years ago
- Freyja is a Golang, Purple Team agent that compiles into Windows, Linux and macOS x64 executables.☆44Updated last year
- apkfram was written in order to help any mobile penetration testers to identify the Framework used to develop the Android application.☆12Updated last year
- docker env for ios research on a mac host☆26Updated 7 months ago
- MacInjector is a tool that lists macOS applications, checks code-signing vulnerabilities, and injects a dynamic library (dylib) into a vu…☆17Updated 3 months ago
- ☆116Updated 2 years ago
- Deployment code for ashirt-server☆20Updated 3 months ago
- Ansible build for Afl++ Frida-Mode☆25Updated last year
- ☆27Updated 2 years ago
- SpiralBL0CK / Remote-buffer-overflow-over-wifi_stack-in-wpa_supplicant-binary-in-android-11-platform-samsung-a20eRemote buffer overflow over wifi_stack in wpa_supplicant binary in android 11, platform:samsung a20e, stock options so like works out of …☆48Updated last year
- Create tar/zip archives that try to exploit zipslip vulnerability.☆48Updated last year
- pîrebok (from Kurdish "witch") - a guided adversarial fuzzer☆14Updated 2 years ago
- gRPC / gRPC-Web Pentest Practicing Lab☆10Updated 2 years ago
- OAuth 2.0 Dynamic Security Scanner☆33Updated 4 years ago
- Simple PoC for demonstrating Race Conditions on Websockets☆55Updated 2 years ago
- Top 2025 Vulnerabilities You Shouldn’t Accept in a Pentest Report☆14Updated 11 months ago
- Bash tool used for proactive detection of malicious activity on macOS systems.☆38Updated 4 months ago
- This repository offers insights and a proof-of-concept tool to exploit two significant deserialization vulnerabilities in Inductive Autom…☆46Updated 2 years ago
- A Python-based tool to create zip, tar and cpio archives to exploit common archive library issues and developer mistakes☆43Updated 2 months ago
- frown (frida-own) – an instrumentation challenge☆25Updated 2 years ago
- Collection of Tools & Techniques for analyzing URLs☆33Updated 2 years ago
- Clear and obvious name of the exploitation technique can create a false sense of familiarity, even if its true potential was never resear…☆37Updated 3 weeks ago
- A set of scripts to install a Burp Collaborator Server in a docker environment, using a LetsEncrypt wildcard certificate in as simple a p…☆30Updated 2 months ago
- FirePrint is a security tool for finding misconfigured Firebase realtime databases in Android or iOS applications.☆22Updated last year