Wiki for Pentesting iOS apps
☆26Jul 23, 2025Updated 7 months ago
Alternatives and similar repositories for iOS-Pentesting
Users that are interested in iOS-Pentesting are comparing it to the libraries listed below
Sorting:
- a multithreaded fast tool to preform active subdomain enumeration☆36Sep 13, 2022Updated 3 years ago
- Cool stealer for Windwos. Cold wallet, VPN, Browsers, File, FileZila and etc Крутой стиллер для Windwos. Крипто кошельки, ВПН, Файлы с ра…☆15May 22, 2022Updated 3 years ago
- This is an app that displays a schedule like roosterinfo.nl☆11Apr 20, 2019Updated 6 years ago
- Tracery is a JavaScript library, by @GalaxyKate, that uses grammars to generate surprising new text.☆10Nov 15, 2017Updated 8 years ago
- A Multi-Processing Tool for collecting and extracting information to an Excel file from a Burp Suite output file.☆10Apr 8, 2024Updated last year
- Discover hidden information on the web with "Elite Google Dorks Search by Biscuit." This collection offers smart and improved Google sear…☆19Aug 10, 2025Updated 6 months ago
- ☆11Aug 25, 2018Updated 7 years ago
- PoC List☆10Sep 4, 2022Updated 3 years ago
- Stanford Internet Observatory publications☆14Dec 2, 2021Updated 4 years ago
- Swift/UIKit reimplementation of the Dune II RTS game☆48Apr 12, 2022Updated 3 years ago
- All in one web Recon app☆42Jun 11, 2024Updated last year
- Tool is to check for Cache Deception Attack Both For Authenticated and UnAuthenticated Pages☆44Nov 23, 2021Updated 4 years ago
- Obsidian is a colorscheme for Vim☆10Apr 10, 2016Updated 9 years ago
- IDA Pro plug-in to fix/extract/view RTTI information☆11Jan 23, 2018Updated 8 years ago
- Small wiki for Mobile Application Penetration Testing Tools☆12Apr 8, 2021Updated 4 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, website…☆14Aug 23, 2022Updated 3 years ago
- A PE morphing tool that allows you to mimic one executable file to another.☆11Dec 6, 2023Updated 2 years ago
- Kobold: Evaluating Decentralized Access Control for Remote NSXPC Methods on iOS☆10Jun 6, 2020Updated 5 years ago
- RSA算法是现代安全技术的基石,通过自己学习,利用JAVA代码实现其功能,项目中只有RSA的核心代码☆10Feb 20, 2021Updated 5 years ago
- Zac's assorted config files☆10Jan 11, 2017Updated 9 years ago
- My latest setup configs.☆10Aug 7, 2016Updated 9 years ago
- Fast scanner for exposed env files☆14Nov 14, 2022Updated 3 years ago
- Advanced shellcode injector for images supports BMP, GIF, EXIF (JPEG), and LSB (PNG) techniques. Includes XOR encoding, offset indexing, …☆25Jun 11, 2025Updated 8 months ago
- Shellcode loader with evasion capabilities written in Nim☆14Jan 25, 2025Updated last year
- Various scripts & tools☆12Apr 22, 2024Updated last year
- ☆13Dec 7, 2023Updated 2 years ago
- Material utilizado na Live sobre Buffer Overflow☆10Aug 10, 2018Updated 7 years ago
- TemporalX gRPC and Documentation Resources☆14Apr 11, 2023Updated 2 years ago
- ☆12Feb 27, 2022Updated 4 years ago
- ☆11May 18, 2020Updated 5 years ago
- 🧿Join your two exe files☆11Jul 14, 2020Updated 5 years ago
- Built for brute-force attack, constructed using the Rust language for the most sensitive network protocols and services, including FTP, S…☆11Dec 26, 2024Updated last year
- A full-stack 3D CSS synthesizer that takes user-submitted MIDIs and play them!☆11Jul 30, 2024Updated last year
- 🗣️ libp2p pubsub with controls exposed via a gRPC API☆14Jul 5, 2019Updated 6 years ago
- ☆11Jul 16, 2018Updated 7 years ago
- An knowledge graph for data structures and algorithms in markdown format☆12Jul 22, 2022Updated 3 years ago
- Piet language in Ruby☆13Nov 12, 2024Updated last year
- Social Engineering for the Blue Team☆11Feb 1, 2024Updated 2 years ago
- ☆11Apr 10, 2018Updated 7 years ago