mitre / vulnerable-mobile-apps
☆30Updated 5 years ago
Alternatives and similar repositories for vulnerable-mobile-apps
Users that are interested in vulnerable-mobile-apps are comparing it to the libraries listed below
Sorting:
- Scripts that we use for pentesting☆42Updated 8 years ago
- ☆57Updated 4 years ago
- This is a container of web applications that work with OWASP Bug Bounty for Projects☆32Updated 2 weeks ago
- A modified version of Mike Czumak's enumeration scanner☆19Updated 6 years ago
- Microsoft Excel spreadsheets for consistent security evaluation of Android and iOS mobile applications☆50Updated 9 years ago
- ☆26Updated 4 years ago
- URLCrazy☆31Updated 12 years ago
- Materials related to the 2017 BSides Las Vegas presentation☆52Updated 4 years ago
- Highlight Burp proxy requests made by different browsers☆30Updated 7 years ago
- Plugins for the Serpico Project☆23Updated 6 years ago
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆34Updated 8 years ago
- Analysis of wifi probe request data☆11Updated 7 years ago
- Random collection of exploit code, tools, scripts, etc.☆27Updated 10 years ago
- Python Tool for Host Enumeration☆50Updated 8 years ago
- Puny Domain Name Check☆37Updated 5 years ago
- iPhone security labs☆60Updated 13 years ago
- ☆122Updated 7 years ago
- Helper scripts to assist penetration testing and exploit development☆37Updated 5 months ago
- Repo contains a list of random scripts that I use while testing out random things.☆47Updated 6 years ago
- WhiteBox CMS analysis☆69Updated last year
- Slides from various talks that I've given over the years☆118Updated last year
- Burp Notes Extension is a plugin for Burp Suite that adds a Notes tab. The tool aims to better organize external files that are created d…☆67Updated last year
- Plaintext Password harvesting from Azure Windows VMs☆67Updated 7 years ago
- Tools used for Penetration testing / Red Teaming☆66Updated 6 years ago
- This is just a dumping ground for metasploit modules that I've worked on or am working on. Some have been submitted to Rapid7 and some h…☆17Updated 9 years ago
- Extreme Vulnerable Node Application☆96Updated 6 years ago
- An automated SMB relay exploitation script.☆154Updated 8 years ago
- A simplified SMB Email Client Attack script used for pentests.☆30Updated 6 years ago
- Burp extension to help developers replicate findings from pen tests☆70Updated 9 months ago
- Encoder, Decoder, Converter, Calculator, TU WAS DU WILLST .. for various codings used in the wild wide web☆43Updated 10 months ago