stuxctf / mhf
Mobile Helper Framework (mhf) is a tool that automates the process of identifying the framework/technology used to create a mobile application. Additionally, it assists in finding sensitive information or provides suggestions for working with the identified platform.
☆22Updated 8 months ago
Alternatives and similar repositories for mhf:
Users that are interested in mhf are comparing it to the libraries listed below
- Mitigation validation utility for the Ivanti Connect Around attack chain. Runs multiple checks. CVE-2023-46805, CVE-2024-21887.☆12Updated last year
- Wounty is a simple web enumeration script that makes use of other popular tools to automate the early stages of recognition in Bug Bounty…☆14Updated 3 years ago
- A straightforward tool for exploiting SMTP Smuggling vulnerabilities.☆15Updated 9 months ago
- Exploit Proof-of-Concept code for XAMPP v3.3.0 — '.ini' Buffer Overflow (Unicode + SEH)☆14Updated last year
- PoC for Exploiting CVE-2024-31848/49/50/51 - File Path Traversal☆16Updated 11 months ago
- Exploit POC for CVE-2024-22026 affecting Ivanti EPMM "MobileIron Core"☆13Updated 11 months ago
- Burp extension used to snip any header from all the requests.☆22Updated last year
- Advanced test for proxy & waf☆13Updated 7 months ago
- This tools used for Automating finding of subdomain, and checking for alive subdomain, and gathering js files from all the subdomain and …☆20Updated 9 months ago
- Lexmark CVE-2023-26067☆25Updated last year
- ☆18Updated 4 months ago
- ☆28Updated last year
- Burp extension to track your current IP address. Extension focused for red teams where the attacker needs to log all used IP addresses.☆25Updated last year
- GTFO Command Line Interface for easy binaries search commands that can be used to bypass local security restrictions in misconfigured sys…☆18Updated 2 months ago
- A security assessment tool for Hitachi Vantara's Pentaho Business Analytics platform.☆14Updated 3 years ago
- This repository presents a proof-of-concept of CVE-2023-22527☆12Updated last year
- Cleo Unrestricted file upload and download PoC (CVE-2024-50623)☆22Updated 4 months ago
- CVE-2023-26818 Exploit MacOS TCC Bypass W/ Telegram☆17Updated 10 months ago
- This repository presents a proof-of-concept of CVE-2024-23897☆16Updated last year
- Tomcat backdoor based on CS blog☆27Updated last year
- POC for unauthenticated RCE in Aspect Unified Installation Assistant by Aspect Software found in 2021.☆13Updated last year
- Proof of Concept Exploit for CVE-2024-9465☆29Updated 6 months ago
- CVE-2024-23108: Fortinet FortiSIEM Unauthenticated 2nd Order Command Injection☆32Updated 11 months ago
- H&E- Burp Highlighter and Extractor☆18Updated 2 years ago
- Updated Exploit - pfBlockerNG <= 2.1.4_26 Unauth RCE (CVE-2022-31814)☆23Updated 9 months ago
- ☆19Updated 10 months ago
- Manage attack surface data on Elasticsearch☆22Updated last year
- Simple Python script to sort nuclei scans by severity and URL☆29Updated last year
- Unauthorized Access to Metadata and User Data like CTF☆26Updated 4 months ago
- recon.cloud is website that scans AWS, Azure and GCP public cloud footprint this GO tool only utilize its API for getting result to termi…☆23Updated 2 years ago