☆11Aug 25, 2018Updated 7 years ago
Alternatives and similar repositories for iOS-Penetration-Test-Tools
Users that are interested in iOS-Penetration-Test-Tools are comparing it to the libraries listed below
Sorting:
- Burp extension to automatically drop requests that match a certain regex.☆10Mar 10, 2023Updated 3 years ago
- MCSema Build Windows download☆11Jul 6, 2020Updated 5 years ago
- modified Parallels Tools for Ubuntu (modify install error)☆12Jul 27, 2018Updated 7 years ago
- Amoeba: Binary Code Diverisfication through Composite Software Diversification☆10Aug 3, 2017Updated 8 years ago
- Stats about HTTP response security headers usage mentioned by the OSHP.☆17Jan 25, 2026Updated last month
- Radamsa fuzzer extension for Burp Suite☆23Jun 25, 2013Updated 12 years ago
- Run python script in IOS platform☆12Sep 3, 2017Updated 8 years ago
- The Binary Mutation code based on Uroboros☆14Feb 20, 2019Updated 7 years ago
- Prompt engineering based on ChatGLM-6B☆10May 12, 2023Updated 2 years ago
- iOS微信逆向☆11Aug 2, 2017Updated 8 years ago
- ☆20Jan 12, 2022Updated 4 years ago
- Windows Post-Exploitation tools wrapper☆12Jun 24, 2024Updated last year
- GTFO Command Line Interface for easy binaries search commands that can be used to bypass local security restrictions in misconfigured sys…☆18Jan 26, 2026Updated last month
- A python metamorphic engine for PE/PE+ files.☆15Jan 1, 2023Updated 3 years ago
- 🌹一个基于 Flask、Vue的前后端分离的Supervisor多节点管理平台☆11Jan 11, 2020Updated 6 years ago
- Melee: Tool to Detect Infections in MySQL Instances☆22Aug 6, 2023Updated 2 years ago
- build电子书的目录,记录心得。☆11Jan 13, 2024Updated 2 years ago
- Files related to my presentation at SigSegV2 conference in 2019. You can find related papers on my blog☆13Dec 12, 2019Updated 6 years ago
- Android APK Crawler☆10Nov 8, 2017Updated 8 years ago
- The anonymous credentials zoo☆16Mar 17, 2021Updated 5 years ago
- Package provides a minimal and simple integration to attach OWASP security headers for building a secure Laravel application.☆18Mar 10, 2023Updated 3 years ago
- 图像处理接口:图像解模糊(deblurring)和图像超分辨率还原(Super-resolution)深度学习框架tensorflow和torch,并实现web后端基于python-Flask框架的接口,python语言☆13Sep 25, 2019Updated 6 years ago
- Auto Recon Bash Script☆31Dec 31, 2024Updated last year
- Attacking and defending web and VPN session hijacking in Pulse Secure Connect☆14Oct 24, 2019Updated 6 years ago
- Comfy & powerful Red Team Infrastructure deployement using Docker☆13Oct 29, 2019Updated 6 years ago
- Burp extension that checks application requests and responses for indicators of vulnerability or targets for attack☆41Dec 23, 2022Updated 3 years ago
- C code metamorphic obfuscator☆13Feb 20, 2015Updated 11 years ago
- Example of a vulnerable NodeJS+Express+MySQL service☆20Jan 17, 2023Updated 3 years ago
- Build your iOS 11+ apps with the ready-to-use Core ML models below☆18Sep 13, 2017Updated 8 years ago
- Check for know iframeBuster XSS☆12Sep 25, 2024Updated last year
- The FindBugs plugin for security audits of Java web applications and Android applications. (Also work with Scala and Groovy projects)☆21Feb 26, 2024Updated 2 years ago
- ☆27Aug 18, 2023Updated 2 years ago
- Linux Post-Exploitation tools wrapper☆20Mar 21, 2023Updated 3 years ago
- Deep Learning and Training dicom file with Caffe and Regression Prediction by age label.☆15Dec 17, 2017Updated 8 years ago
- The dexdump tool☆17Dec 27, 2013Updated 12 years ago
- Advanced Vulnerable Web Application (AVWA)☆14Jun 10, 2017Updated 8 years ago
- Apply a filter to the events being reported by windows event logging☆15Sep 10, 2020Updated 5 years ago
- An alternative for Metasploit psexec module, with automation capabilites to run across multiple hosts, while detecting the correct archit…☆14Oct 12, 2015Updated 10 years ago
- Security Advisories☆11Sep 22, 2019Updated 6 years ago