romanzaikin / BurpExtension-WhatsApp-Decryption-CheckPointLinks
This tool was created during our research at Checkpoint Software Technologies on Whatsapp Protocol (This repository will be updated after BlackHat 2019)
☆646Updated 5 years ago
Alternatives and similar repositories for BurpExtension-WhatsApp-Decryption-CheckPoint
Users that are interested in BurpExtension-WhatsApp-Decryption-CheckPoint are comparing it to the libraries listed below
Sorting:
- MARA is a Mobile Application Reverse engineering and Analysis Framework. It is a toolkit that puts together commonly used mobile applicat…☆649Updated 6 years ago
- StaCoAn is a crossplatform tool which aids developers, bugbounty hunters and ethical hackers performing static code analysis on mobile ap…☆853Updated 4 years ago
- double-free bug in WhatsApp exploit poc☆266Updated 4 years ago
- Blueborne CVE-2017-0785 Android information leak vulnerability☆466Updated 7 years ago
- PoC scripts demonstrating the BlueBorne vulnerabilities☆604Updated 4 years ago
- Droidefense: Advance Android Malware Analysis Framework☆482Updated 2 years ago
- A front-end JavaScript toolkit for creating DNS rebinding attacks.☆507Updated 3 years ago
- Python script to inject existing Android applications with a Meterpreter payload.☆646Updated 2 years ago
- Quickly analyze and reverse engineer Android packages☆800Updated 2 years ago
- Stealing CSRF tokens with CSS injection (without iFrames)☆324Updated 7 years ago
- A tool for finding and analyzing private (and public) key files, including support for Android APK files.☆275Updated 2 years ago
- One-Step APK Decompilation With Multiple Backends☆282Updated 4 years ago
- A collection of various awesome lists for hackers, pentesters and security researchers☆329Updated 8 years ago
- (deprecated) Android application vulnerability analysis and Android pentest tool☆290Updated 6 years ago
- Android Security Suite for in-depth reconnaissance and static bytecode analysis based on Ghera benchmarks.☆545Updated 2 years ago
- Purpose only! The dangers of Bluetooth implementations: Unveiling zero day vulnerabilities and security flaws in …☆280Updated 4 years ago
- Spawn to shell without any credentials by using CVE-2018-10933 (LibSSH)☆498Updated last year
- IP obfuscator made to make a malicious ip a bit cuter☆549Updated 10 months ago
- The Mobile App Pentest cheat sheet was created to provide concise collection of high value information on specific mobile application pen…☆287Updated 7 years ago
- ☠ Man-in-the-middle wireless access point inside a docker container 🐳☆450Updated 7 years ago
- A "malicious" DNS server for executing DNS Rebinding attacks on the fly (public instance running on rebind.network:53)☆654Updated 3 years ago
- Nameserver DNS poisoning attacks made easy☆524Updated 8 years ago
- Decipher hashes using online rainbow & lookup table attack services.☆156Updated 2 years ago
- Nano is a family of PHP web shells which are code golfed for stealth.☆442Updated 5 years ago
- Intercept, modify, repeat and attack Android's Binder transactions using Burp Suite☆322Updated 8 years ago
- Modern tactical exploitation toolkit.☆849Updated last year
- Capture handshakes of nearby WiFi networks automatically☆763Updated 4 years ago
- network reconnaissance toolkit☆427Updated 6 years ago
- This repository is to make life of the pentester easy as it is a collection of the websites that can be used by pentesters for day to day…☆369Updated last year
- intercepting kali router☆440Updated 7 years ago