☆20May 1, 2024Updated last year
Alternatives and similar repositories for MobileDojo
Users that are interested in MobileDojo are comparing it to the libraries listed below
Sorting:
- web cache deception detect☆38Jan 9, 2026Updated last month
- Unicode Security Toolkit☆40Oct 7, 2024Updated last year
- ☆42Jul 16, 2018Updated 7 years ago
- Linux Developer Libraries☆12May 8, 2017Updated 8 years ago
- A curated list of GPT agents for cybersecurity☆12Oct 2, 2024Updated last year
- SCRIPT TERMUX HACK AKUN FACEBOOK☆17Jul 27, 2024Updated last year
- ☆14Aug 22, 2025Updated 6 months ago
- Spawn Up quickly Elastic EDR Panel☆13Jan 29, 2022Updated 4 years ago
- Scan for open S3 buckets and dump☆10Mar 8, 2018Updated 7 years ago
- Root a Toon 1 or Toon 2 using a USB stick, not a Raspberry Pi (based on solution by Igor Ybema)☆20Sep 30, 2022Updated 3 years ago
- apkfram was written in order to help any mobile penetration testers to identify the Framework used to develop the Android application.☆12Oct 9, 2024Updated last year
- ICU-WP is a Flask-based WordPress username enumeration tool. It detects WordPress sites and uses methods like author URL checks, REST API…☆14Jan 17, 2025Updated last year
- A cross-platform, GPU-accelerated terminal emulator (debian packaging fork)☆11Aug 13, 2024Updated last year
- ☆11Nov 18, 2025Updated 3 months ago
- Browser Bookmark that will ask for keyword(s) and then color highlight these words on the webpage you visit☆12Nov 15, 2023Updated 2 years ago
- ☆11Mar 29, 2022Updated 3 years ago
- An Intentionally designed Vulnerable Android Application built in Kotlin.☆183Apr 19, 2024Updated last year
- ARM 32-bit Raspberry Pi Hacking Int example in Kali Linux.☆12Nov 27, 2025Updated 3 months ago
- Pentest report writing guide☆18Sep 24, 2023Updated 2 years ago
- ☆10Dec 8, 2022Updated 3 years ago
- Collection of Semgrep rules for security analysis☆10Mar 30, 2024Updated last year
- Aggregated wordlist pulled from commonly used tools for discovery, enumeration, fuzzing, and exploitation.☆11Dec 30, 2020Updated 5 years ago
- ☆10May 25, 2023Updated 2 years ago
- Binary matching with Binary Ninja☆22Jul 8, 2024Updated last year
- Block abused TLDs in Tenant Allow BlockList☆14Jan 21, 2026Updated last month
- A tool to show only printable characters of a file☆11Oct 2, 2023Updated 2 years ago
- Challenges from CSAW 2019 Pwn Race Edition☆12Nov 8, 2019Updated 6 years ago
- Lorex 2K Indoor Wi-Fi Security Camera: RCE Exploit Chain☆16Dec 3, 2024Updated last year
- XXE techniques☆14Oct 10, 2021Updated 4 years ago
- Republic of Korea (South Korea) specific OSINT source list☆16Mar 2, 2022Updated 4 years ago
- PowerShell module with commands for working with Azure AD Privileged Identity Management☆13Aug 6, 2025Updated 6 months ago
- Calculator, for Programmers!☆11Oct 8, 2025Updated 4 months ago
- 3.60 module dump☆10Aug 26, 2016Updated 9 years ago
- Think of this PS-module as a helper for Microsoft Graph version-management, connectivity and data management using Microsoft Graph.☆14Apr 28, 2025Updated 10 months ago
- A collection of hacking / penetration testing resources to make you better!☆12Oct 1, 2020Updated 5 years ago
- Template for creating a static website based on Hugo, Netlify CMS and Azure Static Web Apps.☆11Mar 24, 2022Updated 3 years ago
- Binary Ninja Plugin for devi - see https://github.com/murx-/devi/ for devi details☆20Jan 17, 2024Updated 2 years ago
- The most available software’s for the tracking purpose of any cell phone user. Spy mobile tracker is compatible with any smart phone like…☆12Dec 7, 2015Updated 10 years ago
- Automate Maldoc creation☆24Apr 22, 2025Updated 10 months ago