mitre / vulnerable-mobile-appsLinks
☆31Updated 6 years ago
Alternatives and similar repositories for vulnerable-mobile-apps
Users that are interested in vulnerable-mobile-apps are comparing it to the libraries listed below
Sorting:
- Microsoft Excel spreadsheets for consistent security evaluation of Android and iOS mobile applications☆50Updated 10 years ago
- Hashmash is a tool to aid in generating hashes from user supplied values and Epochs☆63Updated 9 years ago
- Encoder, Decoder, Converter, Calculator, TU WAS DU WILLST .. for various codings used in the wild wide web☆41Updated last year
- A modified version of Mike Czumak's enumeration scanner☆19Updated 7 years ago
- Python Tool for Host Enumeration☆50Updated 8 years ago
- Tools used for Penetration testing / Red Teaming☆66Updated 7 years ago
- Common Findings Database☆102Updated 6 years ago
- CryptOMG is a configurable CTF style test bed that highlights common flaws in cryptographic implementations.☆193Updated 10 years ago
- Subdomain brute force focused on speed and data serialization☆75Updated 3 years ago
- ☆57Updated 5 years ago
- Security Payload Unit Test Repository (SPUTR)☆86Updated 2 years ago
- PwnableWeb is a suite of web applications for use in information security training.☆86Updated 11 years ago
- Burp Notes Extension is a plugin for Burp Suite that adds a Notes tab. The tool aims to better organize external files that are created d…☆66Updated last year
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆35Updated 9 years ago
- Slides from various talks that I've given over the years☆118Updated 2 years ago
- The iOS Agent for the Needle Security Assessment Framework☆43Updated 8 years ago
- Nmap enumeration and script scan automation script☆38Updated 2 years ago
- ☆61Updated 7 years ago
- Repo contains a list of random scripts that I use while testing out random things.☆48Updated 6 years ago
- Vulnerable web site. Used to test sentinel features.☆11Updated 9 years ago
- The initial conversation slides and menu of scenarios☆38Updated 4 years ago
- Materials related to the 2017 BSides Las Vegas presentation☆52Updated 5 years ago
- The Adaptive Security Testing Methodology (ASTM) provides context-adjusted testing methodologies based on factors such as time available …☆48Updated 3 years ago
- Burplay is a Burp Extension allowing for replaying any number of requests using same modifications definition. Its main purpose is to aid…☆83Updated 8 years ago
- Easy 802.1Q VLAN Hopping☆80Updated last year
- iPhone security labs☆61Updated 14 years ago
- A tool to generate graph and other output from NMAP XML files☆116Updated 6 years ago
- ☆90Updated 8 years ago
- A tool for importing vulnerability scanner data and then allowing you to manipulate the risks, affected hosts, and create risk ordered ou…☆80Updated last year
- Provide a shell-like interface for exploiting Remote File Inclusion vulnerabilities.☆46Updated 9 years ago