justmobilesec / just-mobile-security-mobile-dockerLinks
☆26Updated 2 months ago
Alternatives and similar repositories for just-mobile-security-mobile-docker
Users that are interested in just-mobile-security-mobile-docker are comparing it to the libraries listed below
Sorting:
- ☆22Updated 2 years ago
- ☆21Updated 4 months ago
- Automated iOS Frida Gadget injection and Testflight deployment using Frida and Fastlane☆14Updated 2 years ago
- damn-exploitable-android-app-apk☆40Updated 2 years ago
- External Playbooks for Public Access☆40Updated 11 months ago
- "Terrible Thick Client" is a vulnerable application developed in C# .NET framework.☆20Updated 2 years ago
- ☆27Updated 2 years ago
- pîrebok (from Kurdish "witch") - a guided adversarial fuzzer☆14Updated 2 years ago
- Exploit POC for CVE-2024-22026 affecting Ivanti EPMM "MobileIron Core"☆15Updated last year
- Ansible build for Afl++ Frida-Mode☆25Updated last year
- Detect code obfuscation through text classification in the detection process.☆45Updated last year
- OAuth 2.0 Dynamic Security Scanner☆33Updated 4 years ago
- A tool for check available dependency packages across npmjs, PyPI or RubyGems registry.☆30Updated 3 years ago
- Simple PoC for demonstrating Race Conditions on Websockets☆55Updated 2 years ago
- docker env for ios research on a mac host☆22Updated 7 months ago
- A set of scripts to install a Burp Collaborator Server in a docker environment, using a LetsEncrypt wildcard certificate in as simple a p…☆30Updated last month
- ☆116Updated 2 years ago
- Create tar/zip archives that try to exploit zipslip vulnerability.☆48Updated last year
- apkfram was written in order to help any mobile penetration testers to identify the Framework used to develop the Android application.☆12Updated last year
- A Python-based tool to create zip, tar and cpio archives to exploit common archive library issues and developer mistakes☆43Updated last month
- This repository offers insights and a proof-of-concept tool to exploit two significant deserialization vulnerabilities in Inductive Autom…☆46Updated 2 years ago
- OWASP Foundation Web Respository☆36Updated 4 years ago
- SpiralBL0CK / Remote-buffer-overflow-over-wifi_stack-in-wpa_supplicant-binary-in-android-11-platform-samsung-a20eRemote buffer overflow over wifi_stack in wpa_supplicant binary in android 11, platform:samsung a20e, stock options so like works out of …☆48Updated last year
- Encode and Fuzz Custom Protobuf Messages in Burp Suite☆35Updated 10 months ago
- A collection of utilities for building extensions using Burp's Montoya API☆52Updated 2 months ago
- Top 2025 Vulnerabilities You Shouldn’t Accept in a Pentest Report☆14Updated 11 months ago
- Paper, data and code from Investigating Potential Security Vulnerability Manifestation through Various Analyses & Inferences Regarding In…☆19Updated 4 years ago
- S3 bucket enumerator☆30Updated 6 years ago
- ☆26Updated 3 years ago
- HazProne is a Cloud Pentesting Framework that emulates close to Real-World Scenarios by deploying Vulnerable-By-Demand AWS resources enab…☆40Updated 3 years ago