nettitude / scroungerLinks
Mobile application testing toolkit
☆244Updated 7 years ago
Alternatives and similar repositories for scrounger
Users that are interested in scrounger are comparing it to the libraries listed below
Sorting:
- Penetration testing and auditing toolkit for Android apps.☆244Updated 9 months ago
- We Use Github Extensively and openly. So it becomes dificult to track what's what and what's where. This repository is a master repo to H…☆137Updated 2 years ago
- The Mobile App Pentest cheat sheet was created to provide concise collection of high value information on specific mobile application pen…☆291Updated 7 years ago
- (deprecated) Android application vulnerability analysis and Android pentest tool☆293Updated 7 years ago
- OASAM is the acronym of Open Android Security Assessment Methodology and its purpose is to become a reference framework on Android applic…☆85Updated 3 years ago
- Python tool that generates an Xmind map with all the information gathered and any evidence of possible vulnerabilities identified via sta…☆125Updated 7 years ago
- Static analysis tool for Android/iOS apps focusing on security issues outside the source code☆134Updated 2 years ago
- bash script to facilitate some aspects of an Android application assessment☆159Updated 4 years ago
- Intercept, modify, repeat and attack Android's Binder transactions using Burp Suite☆323Updated 8 years ago
- Damn Vulnerable Hybrid Mobile App (DVHMA) is an hybrid mobile app (for Android) that intentionally contains vulnerabilities.☆268Updated 7 years ago
- Collection of Android security related resources☆104Updated last year
- Java Object Deserialization on Android☆86Updated 6 years ago
- Files for appsecwiki.com☆120Updated 5 years ago
- [A]ndroid [A]pplication [P]entest [G]uide☆122Updated 6 years ago
- Exploits by 1N3 @CrowdShield @xer0dayz @XeroSecurity☆203Updated 4 years ago
- Database of websites for penetration testing☆180Updated 5 years ago
- ☆156Updated last year
- This code is vulnerable to SQL Injection and having SQLite database. For SQLite database, SQL Injection payloads are different so it is f…☆159Updated 4 years ago
- CapFuzz - capture, fuzz & intercept web traffic.☆64Updated 6 years ago
- Improved decoder for Burp Suite☆138Updated 4 years ago
- Bodhi - Client-side Vulnerability Playground☆122Updated 4 years ago
- ☆208Updated 4 years ago
- A Burp Extension to test applications for vulnerability to the Web Cache Deception attack☆139Updated 4 years ago
- Toolkit for implant attack of IoT devices☆136Updated 7 years ago
- A CRLF ( Carriage Return Line Feed ) Injection attack occurs when a user manages to submit a CRLF into an application. This is most commo…☆49Updated 3 years ago
- backHack, a tool to perform Android app analysis by backing up and extracting apps, allowing you to analyze and modify file system conten…☆66Updated 5 years ago
- ☆231Updated 10 years ago
- Automated Pentest Tools Designed For Parrot Linux☆84Updated 6 years ago
- A quick and dirty python script to embed a Metasploit generated APK file into another APK for fun.☆144Updated 2 years ago
- Learning Penetration Testing of Android Applications☆80Updated 8 years ago