romanzaikin / BurpExtension-WhatsApp-Decryption-CheckPoint
This tool was created during our research at Checkpoint Software Technologies on Whatsapp Protocol (This repository will be updated after BlackHat 2019)
☆644Updated 5 years ago
Alternatives and similar repositories for BurpExtension-WhatsApp-Decryption-CheckPoint:
Users that are interested in BurpExtension-WhatsApp-Decryption-CheckPoint are comparing it to the libraries listed below
- MARA is a Mobile Application Reverse engineering and Analysis Framework. It is a toolkit that puts together commonly used mobile applicat…☆637Updated 5 years ago
- Blueborne CVE-2017-0785 Android information leak vulnerability☆465Updated 7 years ago
- One-Step APK Decompilation With Multiple Backends☆265Updated 4 years ago
- Android Security Suite for in-depth reconnaissance and static bytecode analysis based on Ghera benchmarks.☆541Updated 2 years ago
- PoC scripts demonstrating the BlueBorne vulnerabilities☆597Updated 3 years ago
- Andromeda - Interactive Reverse Engineering Tool for Android Applications☆707Updated 5 years ago
- Quickly analyze and reverse engineer Android packages☆781Updated 2 years ago
- (deprecated) Android application vulnerability analysis and Android pentest tool☆289Updated 6 years ago
- double-free bug in WhatsApp exploit poc☆265Updated 4 years ago
- Purpose only! The dangers of Bluetooth implementations: Unveiling zero day vulnerabilities and security flaws in …☆277Updated 3 years ago
- Droidefense: Advance Android Malware Analysis Framework☆481Updated 2 years ago
- Modern tactical exploitation toolkit.☆846Updated 9 months ago
- Python script to inject existing Android applications with a Meterpreter payload.☆645Updated last year
- Stealing CSRF tokens with CSS injection (without iFrames)☆320Updated 7 years ago
- IP obfuscator made to make a malicious ip a bit cuter☆545Updated 6 months ago
- StaCoAn is a crossplatform tool which aids developers, bugbounty hunters and ethical hackers performing static code analysis on mobile ap…☆844Updated 3 years ago
- A POSIX-compliant, fully automated WPA PSK PMKID and handshake capture script aimed at penetration testing☆357Updated 6 months ago
- Cloak can backdoor any python script with some tricks.☆493Updated 5 years ago
- Nameserver DNS poisoning attacks made easy☆520Updated 8 years ago
- A "malicious" DNS server for executing DNS Rebinding attacks on the fly (public instance running on rebind.network:53)☆643Updated 3 years ago
- mXtract - Memory Extractor & Analyzer☆588Updated 3 years ago
- Perform advanced MiTM attacks on websites with ease 💉☆674Updated last year
- Know the dangers of credential reuse attacks.☆2,050Updated 6 months ago
- GTRS - Google Translator Reverse Shell☆615Updated 6 months ago
- DNS Rebinding Exploitation Framework☆489Updated 3 years ago
- Spawn to shell without any credentials by using CVE-2018-10933 (LibSSH)☆498Updated last year
- We Use Github Extensively and openly. So it becomes dificult to track what's what and what's where. This repository is a master repo to H…☆133Updated 2 years ago
- Fierce.pl Domain Scanner☆299Updated 5 years ago
- Mobile application testing toolkit☆239Updated 6 years ago
- Fast and easy create backdoor office exploitation using module metasploit packet , Microsoft Office , Open Office , Macro attack , Buffer…☆439Updated 7 years ago