m2sup3rn0va / SiAAALinks
Small wiki for Mobile Application Penetration Testing Tools
☆12Updated 4 years ago
Alternatives and similar repositories for SiAAA
Users that are interested in SiAAA are comparing it to the libraries listed below
Sorting:
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆10Updated 3 years ago
- This a Complete tool contained box for Capture The Flag competition. Mostly I have inserted all the necessary tools. Some of the people h…☆11Updated 3 years ago
- This tool is useful to find a particular string in a list of URLs using tesseract's OCR (Optical Character Recognition) capabilities☆32Updated 4 years ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆21Updated 4 years ago
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆26Updated 2 years ago
- This is automation tool which utilize 2 sub -domain finder and then sort out working sub-domain and finally scan for sub-doamin TAKEOVER.☆11Updated 2 years ago
- King of Bug Bounty Tips Simple Tool☆13Updated 4 years ago
- An exotic service bruteforce tool.☆13Updated 10 months ago
- Red Team Projects with chat.openai.com.☆17Updated 2 years ago
- ☆17Updated 2 years ago
- CRLFMap is a tool to find HTTP Splitting vulnerabilities☆25Updated 5 years ago
- Wounty is a simple web enumeration script that makes use of other popular tools to automate the early stages of recognition in Bug Bounty…☆14Updated 4 years ago
- your bestfried for finding LinkedIn Employees on github☆16Updated 2 years ago
- A tool that adds reproducible UUIDs to YARA rules☆13Updated last year
- OWASP Foundation Web Respository☆36Updated 4 years ago
- S3 bucket enumerator☆30Updated 6 years ago
- Bash tool used for proactive detection of malicious activity on macOS systems.☆39Updated 4 months ago
- Central IoC scanner based on Loki☆20Updated 4 years ago
- Small python script wrapper for automating hashcat commands☆38Updated 5 years ago
- New Framework Red Team Operations☆20Updated 4 years ago
- Just another vulnerable web application.☆36Updated last year
- Vagrant Files to create a Virtualbox VM for Malware Analysis☆13Updated 4 years ago
- Monitor your target continuously for new subdomains!☆25Updated 2 years ago
- ☆19Updated 5 years ago
- MacroExploit use in excel sheet☆20Updated 2 years ago
- Automated compromise detection of the world's most popular packages☆17Updated 2 years ago
- CIS Benchmark testing of Windows SIEM configuration☆45Updated 2 years ago
- Checklist for pentests, handy commands for to remembers, and a few tools to work on here and there. Far from complete!☆26Updated 2 years ago
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆47Updated 5 years ago
- Workflow for pentesting web applications.☆21Updated 6 years ago