romanzaikin / BurpExtension-WhatsApp-Decryption-CheckPoint
This tool was created during our research at Checkpoint Software Technologies on Whatsapp Protocol (This repository will be updated after BlackHat 2019)
☆644Updated 5 years ago
Alternatives and similar repositories for BurpExtension-WhatsApp-Decryption-CheckPoint:
Users that are interested in BurpExtension-WhatsApp-Decryption-CheckPoint are comparing it to the libraries listed below
- PoC scripts demonstrating the BlueBorne vulnerabilities☆594Updated 3 years ago
- One-Step APK Decompilation With Multiple Backends☆261Updated 4 years ago
- Android Security Suite for in-depth reconnaissance and static bytecode analysis based on Ghera benchmarks.☆539Updated 2 years ago
- double-free bug in WhatsApp exploit poc☆266Updated 4 years ago
- Quickly analyze and reverse engineer Android packages☆777Updated 2 years ago
- MARA is a Mobile Application Reverse engineering and Analysis Framework. It is a toolkit that puts together commonly used mobile applicat…☆636Updated 5 years ago
- Spawn to shell without any credentials by using CVE-2018-10933 (LibSSH)☆498Updated last year
- Blueborne CVE-2017-0785 Android information leak vulnerability☆465Updated 7 years ago
- 🔓Crack hashes using online rainbow & lookup table attack services, right from your terminal.☆234Updated 2 years ago
- Analysis of public exploits or my 1day exploits☆616Updated 4 years ago
- Stealing CSRF tokens with CSS injection (without iFrames)☆320Updated 7 years ago
- Remote Command Execution as SYSTEM on Windows IoT Core (releases available for Python2.7 & Python3)☆378Updated 4 years ago
- (deprecated) Android application vulnerability analysis and Android pentest tool☆286Updated 6 years ago
- Andromeda - Interactive Reverse Engineering Tool for Android Applications☆707Updated 5 years ago
- Modern tactical exploitation toolkit.☆842Updated 8 months ago
- Full exploit chain (CVE-2019-11708 & CVE-2019-9810) against Firefox on Windows 64-bit.☆621Updated 4 years ago
- Purpose only! The dangers of Bluetooth implementations: Unveiling zero day vulnerabilities and security flaws in …☆275Updated 3 years ago
- kernel privilege escalation enumeration and exploitation framework☆690Updated 6 years ago
- GTRS - Google Translator Reverse Shell☆615Updated 5 months ago
- Steal Net-NTLM Hash using Bad-PDF☆1,100Updated 4 years ago
- Python script to inject existing Android applications with a Meterpreter payload.☆645Updated last year
- Auto Root Exploit Tool☆531Updated last year
- Bull's Eye Wordlist Generator - Does your password rely on predictable patterns of accessible info?☆408Updated 3 years ago
- Extract endpoints from apk files.☆871Updated 3 years ago
- DNS Rebinding Exploitation Framework☆488Updated 3 years ago
- The Credential Mapper☆440Updated 7 years ago
- Penetration testing and auditing toolkit for Android apps.☆238Updated 3 weeks ago
- A front-end JavaScript toolkit for creating DNS rebinding attacks.☆493Updated 3 years ago
- PoC exploit for the CVE-2019-15126 kr00k vulnerability☆217Updated 5 years ago
- Bypassing disabled exec functions in PHP (c) CRLF☆401Updated 4 years ago