m2sup3rn0va / SiAAALinks
Small wiki for Mobile Application Penetration Testing Tools
☆12Updated 4 years ago
Alternatives and similar repositories for SiAAA
Users that are interested in SiAAA are comparing it to the libraries listed below
Sorting:
- The Catherine Framework is a general-purpose cybersecurity framework built to provide extended support for defense operations.☆16Updated last year
- This a Complete tool contained box for Capture The Flag competition. Mostly I have inserted all the necessary tools. Some of the people h…☆12Updated 3 years ago
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆26Updated 2 years ago
- King of Bug Bounty Tips Simple Tool☆13Updated 3 years ago
- Just another vulnerable web application.☆36Updated last year
- ☆12Updated 4 years ago
- ☆29Updated 2 years ago
- CRLFMap is a tool to find HTTP Splitting vulnerabilities☆25Updated 5 years ago
- An exotic service bruteforce tool.☆14Updated 4 months ago
- This tool is useful to find a particular string in a list of URLs using tesseract's OCR (Optical Character Recognition) capabilities☆31Updated 3 years ago
- ☆17Updated 2 years ago
- S3 bucket enumerator☆30Updated 6 years ago
- OWASP Foundation Web Respository☆36Updated 3 years ago
- Various scripts & tools☆12Updated last year
- Monitor your target continuously for new subdomains!☆26Updated 2 years ago
- visually see issues with supported cipher suites☆16Updated last year
- Small python script wrapper for automating hashcat commands☆38Updated 4 years ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆20Updated 3 years ago
- Red Team Projects with chat.openai.com.☆17Updated 2 years ago
- Wounty is a simple web enumeration script that makes use of other popular tools to automate the early stages of recognition in Bug Bounty…☆14Updated 3 years ago
- Bash tool used for proactive detection of malicious activity on macOS systems.☆35Updated 2 years ago
- Automated compromise detection of the world's most popular packages☆16Updated last year
- Operating System testbed created with Terraform to test payloads, programs and compatibility on different OS versions. Supports AWS and A…☆19Updated last year
- Reflected Cross-Site Scripting (XSS) vulnerability in 'index.php' login-portal webpage of SourceCodesters Tailor Management System v1.0 a…☆25Updated 4 years ago
- Manage attack surface data on Elasticsearch☆22Updated last year
- RepoReaper is an automated tool crafted to meticulously scan and identify exposed .git repositories within specified domains and their su…☆34Updated last year
- A parallel scanner that utilises axiom to spin up servers and parallel scan using masscan.☆16Updated 5 years ago
- A Python script that gathers all valid IP addresses from all text files from a directory, and checks them against Whois database, TOR rel…☆30Updated 3 years ago
- Generates Malicious Macro and Execute Powershell or Shellcode via MSBuild Application Whitelisting Bypass.☆12Updated 6 years ago
- Reflected Cross-Site Scripting (XSS) vulnerability in 'index.php' login-portal webpage of SourceCodesters Stock Management System v1.0 al…☆21Updated 4 years ago