mitre / vulnerable-mobile-appsLinks
☆30Updated 6 years ago
Alternatives and similar repositories for vulnerable-mobile-apps
Users that are interested in vulnerable-mobile-apps are comparing it to the libraries listed below
Sorting:
- This is a container of web applications that work with OWASP Bug Bounty for Projects☆32Updated last month
- Common Findings Database☆100Updated 5 years ago
- Microsoft Excel spreadsheets for consistent security evaluation of Android and iOS mobile applications☆50Updated 9 years ago
- Materials related to the 2017 BSides Las Vegas presentation☆52Updated 4 years ago
- Extreme Vulnerable Node Application☆95Updated 6 years ago
- Tools used for Penetration testing / Red Teaming☆66Updated 6 years ago
- Analysis of wifi probe request data☆11Updated 7 years ago
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆34Updated 8 years ago
- Random collection of exploit code, tools, scripts, etc.☆26Updated 10 years ago
- Penetration Testing Tools Developed by AppSec Consulting.☆48Updated 6 years ago
- Burp Notes Extension is a plugin for Burp Suite that adds a Notes tab. The tool aims to better organize external files that are created d…☆67Updated last year
- Subdomain brute force focused on speed and data serialization☆75Updated 2 years ago
- A modified version of Mike Czumak's enumeration scanner☆19Updated 6 years ago
- ☆57Updated 4 years ago
- Quick and dirty scripts that don't really belong in a larger project☆34Updated 3 months ago
- Plaintext Password harvesting from Azure Windows VMs☆67Updated 7 years ago
- ☆12Updated 7 years ago
- This is sample code to demonstrate how one can use SQL Injection vulnerability to download local file from server in specific condition. …☆44Updated 8 years ago
- Mobile Security testing Framework☆41Updated 6 years ago
- Inspired by https://github.com/djadmin/awesome-bug-bounty, a list of bug bounty write-up that is categorized by the bug nature☆25Updated 8 years ago
- Scripts, tools, and proof-of-concepts to aid in a penetration test.☆94Updated 4 years ago
- Scripts that we use for pentesting☆42Updated 8 years ago
- ☆98Updated 6 years ago
- Provide a shell-like interface for exploiting Remote File Inclusion vulnerabilities.☆46Updated 8 years ago
- Slides from various talks that I've given over the years☆118Updated last year
- WhiteBox CMS analysis☆69Updated 2 years ago
- The documents☆56Updated 7 years ago
- AWS Extender CLI is a command-line script to test S3 buckets as well as Google Storage buckets and Azure Storage containers for common mi…☆83Updated 5 years ago
- Fingerprint a web app using local files as the fingerprint sources☆38Updated 8 years ago
- tools for analyzing strings from password lists☆59Updated 2 years ago