romanzaikin / BurpExtension-WhatsApp-Decryption-CheckPointLinks
This tool was created during our research at Checkpoint Software Technologies on Whatsapp Protocol (This repository will be updated after BlackHat 2019)
☆645Updated 6 years ago
Alternatives and similar repositories for BurpExtension-WhatsApp-Decryption-CheckPoint
Users that are interested in BurpExtension-WhatsApp-Decryption-CheckPoint are comparing it to the libraries listed below
Sorting:
- double-free bug in WhatsApp exploit poc☆268Updated 4 years ago
- MARA is a Mobile Application Reverse engineering and Analysis Framework. It is a toolkit that puts together commonly used mobile applicat…☆665Updated 6 years ago
- PoC scripts demonstrating the BlueBorne vulnerabilities☆610Updated 4 years ago
- StaCoAn is a crossplatform tool which aids developers, bugbounty hunters and ethical hackers performing static code analysis on mobile ap…☆866Updated 4 years ago
- Blueborne CVE-2017-0785 Android information leak vulnerability☆472Updated 8 years ago
- Android Security Suite for in-depth reconnaissance and static bytecode analysis based on Ghera benchmarks.☆546Updated 3 years ago
- Quickly analyze and reverse engineer Android packages☆832Updated 3 years ago
- One-Step APK Decompilation With Multiple Backends☆290Updated 5 years ago
- Droidefense: Advance Android Malware Analysis Framework☆478Updated 3 years ago
- A tool for finding and analyzing private (and public) key files, including support for Android APK files.☆276Updated 3 years ago
- Python script to inject existing Android applications with a Meterpreter payload.☆644Updated 2 years ago
- IP obfuscator made to make a malicious ip a bit cuter☆549Updated last year
- (deprecated) Android application vulnerability analysis and Android pentest tool☆294Updated 7 years ago
- The Mobile App Pentest cheat sheet was created to provide concise collection of high value information on specific mobile application pen…☆292Updated 8 years ago
- Purpose only! The dangers of Bluetooth implementations: Unveiling zero day vulnerabilities and security flaws in …☆283Updated 4 years ago
- Extract endpoints from apk files.☆876Updated 4 years ago
- Spawn to shell without any credentials by using CVE-2018-10933 (LibSSH)☆498Updated 2 years ago
- Intercept, modify, repeat and attack Android's Binder transactions using Burp Suite☆323Updated 8 years ago
- ☠ Man-in-the-middle wireless access point inside a docker container 🐳☆457Updated 7 years ago
- Stealing CSRF tokens with CSS injection (without iFrames)☆323Updated 8 years ago
- A Bash script that downloads and unzips scripts that will aid with privilege escalation on a Linux system.☆506Updated 4 years ago
- Auto Scanning to SSL Vulnerability☆633Updated 5 years ago
- JShell - Get a JavaScript shell with XSS.☆531Updated 6 years ago
- kernel privilege escalation enumeration and exploitation framework☆700Updated 7 years ago
- 🔓Crack hashes using online rainbow & lookup table attack services, right from your terminal.☆234Updated 3 years ago
- A collection of various awesome lists for hackers, pentesters and security researchers☆329Updated 9 years ago
- Repository for the Smartphone Pentest Framework (SPF)☆458Updated 8 years ago
- Decipher hashes using online rainbow & lookup table attack services.☆155Updated 3 years ago
- Google Search Scraper☆571Updated 6 years ago
- Nano is a family of PHP web shells which are code golfed for stealth.☆449Updated 5 years ago