backHack, a tool to perform Android app analysis by backing up and extracting apps, allowing you to analyze and modify file system contents for apps.
☆67Jul 16, 2020Updated 5 years ago
Alternatives and similar repositories for backHack
Users that are interested in backHack are comparing it to the libraries listed below
Sorting:
- ActionScript ByteCode Disassembler☆16Oct 20, 2015Updated 10 years ago
- A tool to triage screenshots☆20Jun 29, 2017Updated 8 years ago
- Local privilege escalation scripts and tools☆17Aug 4, 2016Updated 9 years ago
- A malware sandoxed with gdb☆15Jun 27, 2016Updated 9 years ago
- Pentester's Tools Parser (PTP) provides an unified way to retrieve the information from all (final goal) automated pentesting tools and a…☆31Mar 21, 2023Updated 2 years ago
- Shellcode Loader Implementing Indirect Dynamic Syscall , API Hashing, Fileless Shellcode retrieving using Winsock2☆13Jul 15, 2023Updated 2 years ago
- IronWASP module to test security of SSL services. Ported from http://www.bolet.org/TestSSLServer/☆12Sep 2, 2013Updated 12 years ago
- My Personal Library for CTF's☆12Apr 3, 2018Updated 7 years ago
- Visually analyze basic block code coverage in Binary Ninja using Pin output.☆11Oct 6, 2017Updated 8 years ago
- python script to bypass cloudflare from command line. built upon cfscrape module.☆19Sep 1, 2020Updated 5 years ago
- My personal Automated Malware Analysis Sandboxes and Services☆24Mar 26, 2017Updated 8 years ago
- Linux and Windows Hardening Points☆12Mar 6, 2018Updated 7 years ago
- CDDC Exploitation Framework☆13Jul 3, 2023Updated 2 years ago
- Dockerized version of cow https://github.com/cyfdecyf/cow☆10Sep 25, 2015Updated 10 years ago
- Maltese - Malware Traffic Emulator☆26Feb 15, 2017Updated 9 years ago
- Bruteforce commandline buffer overflows and automated exploit generation, linux, aggressive arguments☆34Apr 10, 2022Updated 3 years ago
- Utilities for interacting with the Actiontec MI424WR router used by Verizon FIOS.☆15Oct 4, 2009Updated 16 years ago
- Swiss army knife for (web) security specialists.☆12Dec 13, 2017Updated 8 years ago
- Chef repository for pentesting tools☆13Mar 4, 2017Updated 8 years ago
- ☆11Oct 18, 2019Updated 6 years ago
- ☆27Jul 16, 2014Updated 11 years ago
- Create shellcode from executable or assembly code☆12Jul 31, 2017Updated 8 years ago
- PowerShell implementations of path-finding algorithms using graph theory☆79Feb 17, 2016Updated 10 years ago
- Track a presenting person and stream video. Video input & display, Position tracking, Camera PTZ control, Digital video zoom☆19Nov 3, 2017Updated 8 years ago
- ☆12Jan 11, 2020Updated 6 years ago
- a blacklist in iphone without jailbreak☆27Sep 4, 2013Updated 12 years ago
- Java Object Deserialization on Android☆86Apr 11, 2019Updated 6 years ago
- Finding Ethereum nodes which are vulnerable to RPC-attacks☆31May 25, 2016Updated 9 years ago
- Small backdoor using cookie.☆63Oct 18, 2016Updated 9 years ago
- A tool to extract database data from a blind SQL injection vulnerability.☆32Jan 4, 2016Updated 10 years ago
- Learn DevOps☆29Jun 6, 2024Updated last year
- Fuzzing tool written in Golang. Insane monkey not included.☆12Feb 22, 2018Updated 8 years ago
- Aranea is a fast and clean dns spoofing tool.☆17Sep 20, 2011Updated 14 years ago
- JEB Scripts☆21Nov 28, 2014Updated 11 years ago
- Multi-threaded SSH Password Auditor☆93Feb 4, 2014Updated 12 years ago
- Powershell module to assist in attacking Exchange/Outlook Web Access☆182Sep 22, 2016Updated 9 years ago
- You'll never take me alive.☆85May 9, 2014Updated 11 years ago
- ☆17Jul 8, 2021Updated 4 years ago
- OCL Hashcat username to decrypted password recombiner☆15May 21, 2015Updated 10 years ago