stuxctf / mhf
Mobile Helper Framework (mhf) is a tool that automates the process of identifying the framework/technology used to create a mobile application. Additionally, it assists in finding sensitive information or provides suggestions for working with the identified platform.
☆21Updated 7 months ago
Alternatives and similar repositories for mhf:
Users that are interested in mhf are comparing it to the libraries listed below
- PoC for Exploiting CVE-2024-31848/49/50/51 - File Path Traversal☆15Updated 10 months ago
- Burp extension used to snip any header from all the requests.☆22Updated last year
- Mitigation validation utility for the Ivanti Connect Around attack chain. Runs multiple checks. CVE-2023-46805, CVE-2024-21887.☆12Updated last year
- Wounty is a simple web enumeration script that makes use of other popular tools to automate the early stages of recognition in Bug Bounty…☆14Updated 3 years ago
- This repository presents a proof-of-concept of CVE-2023-22527☆12Updated last year
- H&E- Burp Highlighter and Extractor☆18Updated last year
- This tools used for Automating finding of subdomain, and checking for alive subdomain, and gathering js files from all the subdomain and …☆18Updated 8 months ago
- Burp extension to track your current IP address. Extension focused for red teams where the attacker needs to log all used IP addresses.☆25Updated last year
- This repository presents a proof-of-concept of CVE-2024-23897☆15Updated 11 months ago
- GTFO Command Line Interface for easy binaries search commands that can be used to bypass local security restrictions in misconfigured sys…☆18Updated last month
- Gouge is a simple Burp extension to extract or gouge all URLs which are seen in JS files as you visit different websites/webpages in Burp…☆28Updated 8 months ago
- Simple Python script to sort nuclei scans by severity and URL☆29Updated last year
- A straightforward tool for exploiting SMTP Smuggling vulnerabilities.☆14Updated 8 months ago
- A security assessment tool for Hitachi Vantara's Pentaho Business Analytics platform.☆14Updated 3 years ago
- Updated Exploit - pfBlockerNG <= 2.1.4_26 Unauth RCE (CVE-2022-31814)☆23Updated 8 months ago
- A script used to query the dehashed API and filter for more useful results☆15Updated 3 years ago
- ☆25Updated this week
- Exploit POC for CVE-2024-22026 affecting Ivanti EPMM "MobileIron Core"☆13Updated 10 months ago
- Penetration Testing & Red Team tools & scripts☆12Updated last year
- Tomcat backdoor based on CS blog☆27Updated last year
- GBounty Profiles are customizable security test definitions used by the GBounty web scanner to identify vulnerabilities in web applicatio…☆18Updated 2 weeks ago
- ☆17Updated 3 months ago
- Cobalt Strike BOFS☆15Updated last year
- recon.cloud is website that scans AWS, Azure and GCP public cloud footprint this GO tool only utilize its API for getting result to termi…☆23Updated 2 years ago
- Official repository for the Advanced Software Exploitation (ASE) course☆20Updated 6 years ago
- C2Matrix Automation☆12Updated last year
- Proof of Concept Exploit for CVE-2024-9465☆29Updated 5 months ago
- CVE-2024-23108: Fortinet FortiSIEM Unauthenticated 2nd Order Command Injection☆32Updated 10 months ago
- An Vulnerability detection and Exploitation tool for CVE-2024-24919☆24Updated 9 months ago
- Advanced test for proxy & waf☆13Updated 6 months ago