romanzaikin / ITsafe_Mobile_Penetration
Training Apps For Mobile Penetration Book
☆12Updated 5 years ago
Alternatives and similar repositories for ITsafe_Mobile_Penetration:
Users that are interested in ITsafe_Mobile_Penetration are comparing it to the libraries listed below
- Static analysis of APKs with regular expressions☆10Updated 3 years ago
- Serbian/English wordlist for https://github.com/maurosoria/dirsearch☆19Updated 8 years ago
- Working exploit code for CVE-2019-17625☆18Updated 5 years ago
- Security test tool for Blind XSS☆26Updated 5 years ago
- burp extender for fuzzing☆10Updated 6 years ago
- Sr. Penetration Tester. Creator of Sn1per. Top 20 worldwide on @BugCrowd in 2016. OSCE/OSCP/CISSP/Security+☆26Updated 11 months ago
- Find unreferenced AWS S3 buckets which have CloudFront CNAME records pointing to them☆37Updated 6 years ago
- Exploits for some of the vulnerabilities I have discovered☆18Updated 4 years ago
- Automated Google dorking with custom search engines☆27Updated 4 years ago
- It becomes the extension of Burp suite. The cookie set by the BipIP server may include a private IP, which is an extension to detect tha…☆16Updated 10 months ago
- Unauthenticated RCE at Woody Ad Snippets / CVE-2019-15858 (PoC)☆32Updated last year
- Tool to get the top android apps for bug bounty purpose☆17Updated 4 years ago
- Exploiting Android Devices Running Insecure Remote ADB Service☆20Updated 6 years ago
- Everything about xss protection technology☆15Updated 5 years ago
- The Recon scanning tool scans websites for open files & directories specified in the custom config file. Default server configuration fil…☆15Updated 6 years ago
- Burp Intruder File Payload Generator☆18Updated 5 years ago
- Scripts for OSCE☆18Updated 6 years ago
- Ctf Writeups☆10Updated 4 years ago
- Escalation Servers and Scripts for Priv Escalation☆19Updated 5 years ago
- The official exploit for Open-AudIT v3.3.1 Remote Code Execution CVE-2020-12078☆18Updated 4 years ago
- ☆18Updated last year
- Interactive Post Exploitation Tool☆36Updated 5 years ago
- Slides of the talk on Injection attacks in apps with NoSQL Backends, given at null OWASP Bangalore monthly meet on 27th April 2019☆22Updated 5 years ago
- ☆16Updated 6 years ago
- A proof of concept for Metasploit's CVE-2019-5624 vulnerability (Rubyzip insecure ZIP handling RCE)☆13Updated 5 years ago
- ☆25Updated 7 years ago
- Golang code to crawl website, extract links from html, paths from JavaScript code, follow and repeat.☆12Updated 6 years ago
- Just a simple SMTP server, implementation of @corpix smtpd library☆14Updated 4 years ago
- Create wordlists from source codes files/directories for enumeration☆30Updated last year
- An tool for search IOT MQTT vulnerable with shodan☆19Updated 7 years ago