stuxctf / mhf
Mobile Helper Framework (mhf) is a tool that automates the process of identifying the framework/technology used to create a mobile application. Additionally, it assists in finding sensitive information or provides suggestions for working with the identified platform.
☆21Updated 7 months ago
Alternatives and similar repositories for mhf:
Users that are interested in mhf are comparing it to the libraries listed below
- PoC for Exploiting CVE-2024-31848/49/50/51 - File Path Traversal☆15Updated 10 months ago
- Wounty is a simple web enumeration script that makes use of other popular tools to automate the early stages of recognition in Bug Bounty…☆14Updated 3 years ago
- This repository presents a proof-of-concept of CVE-2023-22527☆12Updated last year
- A straightforward tool for exploiting SMTP Smuggling vulnerabilities.☆14Updated 8 months ago
- Burp extension to track your current IP address. Extension focused for red teams where the attacker needs to log all used IP addresses.☆25Updated last year
- ☆17Updated 4 months ago
- OSED Practice binary☆24Updated last year
- ☆21Updated last year
- H&E- Burp Highlighter and Extractor☆18Updated 2 years ago
- Burp extension used to snip any header from all the requests.☆22Updated last year
- Proof of Concept Exploit for CVE-2024-9465☆29Updated 5 months ago
- This repository presents a proof-of-concept of CVE-2024-23897☆15Updated 11 months ago
- Mitigation validation utility for the Ivanti Connect Around attack chain. Runs multiple checks. CVE-2023-46805, CVE-2024-21887.☆12Updated last year
- Simple Python script to sort nuclei scans by severity and URL☆29Updated last year
- Exploit POC for CVE-2024-22026 affecting Ivanti EPMM "MobileIron Core"☆13Updated 10 months ago
- This tools used for Automating finding of subdomain, and checking for alive subdomain, and gathering js files from all the subdomain and …☆19Updated 9 months ago
- Analyzes AdminSDHolder permissions & compares with a previous run, to detect potential backdoor/excessive persistent permission(s)☆15Updated last year
- Monitor your target continuously for new subdomains!☆26Updated 2 years ago
- ☆12Updated last year
- Beacon Object Files used for Cobalt Strike☆17Updated last year
- GBounty Profiles are customizable security test definitions used by the GBounty web scanner to identify vulnerabilities in web applicatio…☆18Updated 3 weeks ago
- Updated Exploit - pfBlockerNG <= 2.1.4_26 Unauth RCE (CVE-2022-31814)☆23Updated 8 months ago
- Penetration Testing & Red Team tools & scripts☆12Updated last year
- CVE-2024-30056 Microsoft Edge (Chromium-based) Information Disclosure Vulnerability☆16Updated 10 months ago
- Cobalt Strike BOFS☆15Updated last year
- A script used to query the dehashed API and filter for more useful results☆15Updated 3 years ago
- Enumerate SSN (System Service Numbers or Syscall ID) and syscall instruction address in ntdll module by parsing the PEB of the current pr…☆20Updated last year
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆26Updated 2 years ago
- Exploit Proof-of-Concept code for XAMPP v3.3.0 — '.ini' Buffer Overflow (Unicode + SEH)☆14Updated last year
- Gouge is a simple Burp extension to extract or gouge all URLs which are seen in JS files as you visit different websites/webpages in Burp…☆28Updated 8 months ago