Security review guidelines for mobile projects
☆13Sep 25, 2020Updated 5 years ago
Alternatives and similar repositories for mobile-security-review
Users that are interested in mobile-security-review are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆18Feb 16, 2024Updated 2 years ago
- Extensions for CoreData on iOS☆10Nov 11, 2019Updated 6 years ago
- iOS SDK for broadcasting live video with django-broadcast☆10May 2, 2016Updated 9 years ago
- Paginated UIScrollView, a UIPageViewController replacement that supports UIViews instead of UIViewControllers.☆11Jun 10, 2024Updated last year
- [Deprecated]☆20Aug 18, 2016Updated 9 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Pentesting Hacking Tools, Scripts, Windows, Linux,☆29Feb 27, 2016Updated 10 years ago
- A variety of interesting stuff for TDD/BDD on iOS☆85Mar 24, 2017Updated 9 years ago
- Command line tool for generating Swift localization complements.☆28Jul 25, 2015Updated 10 years ago
- Method of finding interesting domains using keywords + JARMs☆13Jan 30, 2023Updated 3 years ago
- Collect and filter location information from social network services.☆11Jun 14, 2020Updated 5 years ago
- The iOS client for deepstream.io☆17Apr 5, 2021Updated 5 years ago
- Incident Response Collections☆11Jul 24, 2018Updated 7 years ago
- security course list☆14Sep 18, 2015Updated 10 years ago
- Sherlock Holmes of the networking layer.☆1,947Oct 24, 2023Updated 2 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Sep0lkit's Blog☆13Apr 18, 2020Updated 6 years ago
- check cmd execute☆14Feb 4, 2017Updated 9 years ago
- Scripts and payloads for internet-wide network scanning☆17Aug 2, 2015Updated 10 years ago
- The Recon scanning tool scans websites for open files & directories specified in the custom config file. Default server configuration fil…☆15Apr 4, 2018Updated 8 years ago
- CodePush Custom Dialog☆19Jan 30, 2022Updated 4 years ago
- This repository contains several AMSI bypasses. These bypasses are based on some very nice research that has been put out by some awesome…☆23Jul 7, 2022Updated 3 years ago
- Network white noise collector☆19Mar 23, 2016Updated 10 years ago
- Hand list of Powershell commands frequently used during penetration tests☆15Oct 14, 2018Updated 7 years ago
- 漏洞demo☆13Jun 10, 2021Updated 4 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Easier layer animations in Swift☆25Oct 6, 2017Updated 8 years ago
- go调用最大cpu内核数实现批量ip列表tcp端口快速扫描☆15Mar 20, 2020Updated 6 years ago
- A curated list of awesome big data frameworks, ressources and other awesomeness.☆17Oct 4, 2021Updated 4 years ago
- BurpSuite Pro Python Extension☆18Jul 11, 2013Updated 12 years ago
- Project created to test the possibilities of UIKit API for custom collection view layouts☆33May 9, 2018Updated 7 years ago
- Template injection allows an attacker to include template code into an existant (or not) template. A template engine makes designing HTML…☆13Jan 30, 2020Updated 6 years ago
- Information Repository on Various Methods of getting shell access into a Windows machine☆17Feb 11, 2020Updated 6 years ago
- A boilerplate for new Serverless Nodejs projects with tests and basic configurations☆14Jan 9, 2023Updated 3 years ago
- Cryptocurrencies related Security resources☆14May 24, 2023Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ingest, model, forecast, ! ...but also I'm just learning Luigi☆14Dec 8, 2022Updated 3 years ago
- Git Repository for the Monobjc Project☆17Jan 4, 2015Updated 11 years ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆11May 25, 2019Updated 6 years ago
- genetic inheritance + Conway's Game of Life.☆12Dec 22, 2014Updated 11 years ago
- Vulnerability consolidation and management tool, enhances scan results by merging different findings of the same weakness across multiple…☆24Dec 16, 2022Updated 3 years ago
- This project deals with vulnerability analysis and classification using machine learning techniques i.e. Natural Language Processing.☆10Feb 21, 2019Updated 7 years ago
- VMware Guide☆14Dec 14, 2021Updated 4 years ago