backHack, a tool to perform Android app analysis by backing up and extracting apps, allowing you to analyze and modify file system contents for apps.
☆67Jul 16, 2020Updated 5 years ago
Alternatives and similar repositories for backHack
Users that are interested in backHack are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ActionScript ByteCode Disassembler☆16Oct 20, 2015Updated 10 years ago
- A tool to triage screenshots☆20Jun 29, 2017Updated 8 years ago
- python script to bypass cloudflare from command line. built upon cfscrape module.☆19Sep 1, 2020Updated 5 years ago
- Proof-of-Concept scripts for various issues.☆14Jan 23, 2017Updated 9 years ago
- Small backdoor using cookie.☆63Oct 18, 2016Updated 9 years ago
- PowerShell implementations of path-finding algorithms using graph theory☆79Feb 17, 2016Updated 10 years ago
- A C# implementation of the PowerShell Empire Agent☆74Apr 22, 2019Updated 6 years ago
- Password cracking utility☆54Apr 6, 2021Updated 4 years ago
- OCL Hashcat username to decrypted password recombiner☆15May 21, 2015Updated 10 years ago
- Aranea is a fast and clean dns spoofing tool.☆17Sep 20, 2011Updated 14 years ago
- This toolkit detects applications vulnerable to DLL hijacking (released in 2010)☆54Oct 16, 2014Updated 11 years ago
- Java Object Deserialization on Android☆86Apr 11, 2019Updated 6 years ago
- IronWASP module to test security of SSL services. Ported from http://www.bolet.org/TestSSLServer/☆12Sep 2, 2013Updated 12 years ago
- Bruteforce commandline buffer overflows and automated exploit generation, linux, aggressive arguments☆34Apr 10, 2022Updated 3 years ago
- Cpanel&WHM Go Client☆12Dec 9, 2018Updated 7 years ago
- Maltese - Malware Traffic Emulator☆26Feb 15, 2017Updated 9 years ago
- Archive of Metasploit Framework v1 (Perl)☆13Sep 29, 2014Updated 11 years ago
- Finding Ethereum nodes which are vulnerable to RPC-attacks☆31May 25, 2016Updated 9 years ago
- Utilities for interacting with the Actiontec MI424WR router used by Verizon FIOS.☆15Oct 4, 2009Updated 16 years ago
- McAfee ePolicy 0wner exploit code☆47Oct 11, 2018Updated 7 years ago
- ☆17Jul 8, 2021Updated 4 years ago
- ☆11Oct 18, 2019Updated 6 years ago
- Local privilege escalation scripts and tools☆17Aug 4, 2016Updated 9 years ago
- Automated Responder/secretsdump.py cracking☆187May 16, 2016Updated 9 years ago
- Pentester's Tools Parser (PTP) provides an unified way to retrieve the information from all (final goal) automated pentesting tools and a…☆31Mar 21, 2023Updated 3 years ago
- Visually analyze basic block code coverage in Binary Ninja using Pin output.☆11Oct 6, 2017Updated 8 years ago
- XMLRPC server for password cracking☆33Jan 20, 2015Updated 11 years ago
- Secure Sockets for Socks☆13Sep 7, 2016Updated 9 years ago
- Linux and Windows Hardening Points☆12Mar 6, 2018Updated 8 years ago
- A tool to extract database data from a blind SQL injection vulnerability.☆32Jan 4, 2016Updated 10 years ago
- PowerShell Module Bindings for Capstone/Keystone☆25Nov 15, 2016Updated 9 years ago
- JEB Scripts☆21Nov 28, 2014Updated 11 years ago
- Download and Execute PowerShell scripts on remote hosts with ease.☆24Jul 11, 2015Updated 10 years ago
- A malware sandoxed with gdb☆15Jun 27, 2016Updated 9 years ago
- A tool for security professionals to access and interact with remote Microsoft Windows based systems.☆432Nov 17, 2017Updated 8 years ago
- The official repo of BSIS☆14Feb 16, 2012Updated 14 years ago
- Python library that facilitates interfacing with BeEF via it's RESTful API☆79May 18, 2017Updated 8 years ago
- 2nd phase of mifare classic nested auth key recovery☆13Dec 11, 2014Updated 11 years ago
- Format string exploit generation☆10Sep 16, 2015Updated 10 years ago