rednaga / compromised-keysLinks
repo with compromised keys and such
☆23Updated 2 years ago
Alternatives and similar repositories for compromised-keys
Users that are interested in compromised-keys are comparing it to the libraries listed below
Sorting:
- Vulnerability Reports by Aleph Research☆35Updated last year
- Linux Distro for Mobile Security, Malware Analysis, and Forensics☆16Updated 10 years ago
- (Abandoned) Extract packages from an Android device☆52Updated 4 years ago
- Simple framework to extract "actionable" data from Android malware (C&Cs, phone numbers etc.)☆108Updated 10 years ago
- Android Connections Forensics☆33Updated 9 years ago
- Automated Information Retrieval From APKs For Initial Analysis☆32Updated 8 years ago
- Tool used for dumping memory from Android devices☆68Updated 10 years ago
- SIM Card tunnel for Alcatel OT-918D☆37Updated 11 years ago
- A tool that enumerates Android devices for information useful in understanding its internals and for exploit development. It supports and…☆54Updated 7 years ago
- PoC exploit for arbitrary file read/write in locked Samsung Android device via MTP (SVE-2017-10086)☆166Updated 7 years ago
- Static Binary Deployer. Download and deploy *Nix utilities on a compromised system.☆28Updated 5 years ago
- The development place of AFFT, a toolkit to automatically acquire and extract data from Android image dumps☆47Updated 9 years ago
- Fork of iSec Partners Android Intent Fuzzer (https://www.isecpartners.com/tools/mobile-security/intent-fuzzer.aspx)☆16Updated 10 years ago
- Tools and scripts dedicated to Android application security☆50Updated 4 years ago
- An Android wrapper for Arc☆11Updated 7 years ago
- UPnP hacking scripts and tools☆76Updated 8 years ago
- This repository contains various shell scripts and tips and tricks used for packaging androidtamer packages☆12Updated 3 years ago
- Framework designed to automate the process of assembly code injection (trojanising) within Android applications.☆44Updated 3 years ago
- Python - Human Interface Device Android Attack Framework☆47Updated 8 years ago
- For collecting probed SSID name by wireless devices, Access point detail and connected clients.☆36Updated 11 years ago
- This is a basic example of how to search into Shodan using the ShodanAPI.☆16Updated 11 years ago
- [WIP] Anti-Forensics ToolKit to clear post-intrusion sensible logfiles 🔥 (For Research Only)☆14Updated 8 years ago
- Mobile phone PWN tools and scripts☆15Updated 5 years ago
- ☆12Updated 11 years ago
- Android Data Extractor Lite☆129Updated 10 years ago
- Patch for hostapd and wpa_supplicant to attempt to exploit heartbleed on EAP-PEAP/TLS/TTLS connections☆106Updated 11 years ago
- Cryptocurrencies related Security resources☆14Updated 2 years ago
- cisco-global-exploiter : This tool detects 14 different vulnerabilities on Cisco routers and switches☆44Updated 6 years ago
- Check All APK's -- scripts for checking your phone for malware☆30Updated 8 years ago
- Bruteforce commandline buffer overflows and automated exploit generation, linux, aggressive arguments☆33Updated 3 years ago