stuxctf / mhfLinks
Mobile Helper Framework (mhf) is a tool that automates the process of identifying the framework/technology used to create a mobile application. Additionally, it assists in finding sensitive information or provides suggestions for working with the identified platform.
☆22Updated last year
Alternatives and similar repositories for mhf
Users that are interested in mhf are comparing it to the libraries listed below
Sorting:
- Burp extension used to snip any header from all the requests.☆23Updated last year
- ☆27Updated 2 years ago
- Proof of Concept for Path Traversal in Apache Struts ("CVE-2023-50164")☆57Updated last year
- A simple mutator engine which focuses on finding unknown classes of injection vulnerabilities☆67Updated last year
- Automated HTTP Request Repeating With Burp Suite☆39Updated 2 years ago
- Unauthorized Access to Metadata and User Data like CTF☆27Updated 8 months ago
- A straightforward tool for exploiting SMTP Smuggling vulnerabilities.☆15Updated last year
- Manage attack surface data on Elasticsearch☆22Updated last year
- PoC for Exploiting CVE-2024-31848/49/50/51 - File Path Traversal☆17Updated last year
- Burp extension to track your current IP address. Extension focused for red teams where the attacker needs to log all used IP addresses.☆25Updated last year
- Simple Python script to sort nuclei scans by severity and URL☆29Updated 2 years ago
- Monitor your target continuously for new subdomains!☆26Updated 2 years ago
- A BurpSuite extension to deploy an OpenVPN config file to DigitalOcean and set up a SOCKS proxy to route traffic through it☆51Updated last year
- Quicky serve files over http or https using flask.☆35Updated 6 months ago
- A security assessment tool for Hitachi Vantara's Pentaho Business Analytics platform.☆14Updated 3 years ago
- WEB-Wordlist-Generator creates related wordlists after scanning your web applications.☆50Updated last year
- DLink DIR-846 Authenticated Remote Code Execution☆18Updated last year
- An Vulnerability detection and Exploitation tool for CVE-2024-24919☆25Updated last year
- A complete security assessment tool that supports common web security issues scanning and custom POC | Be sure to read the document befor…☆19Updated 10 months ago
- Gouge is a simple Burp extension to extract or gouge all URLs which are seen in JS files as you visit different websites/webpages in Burp…☆29Updated last year
- Penetration Testing & Red Team tools & scripts☆12Updated last year
- This repository presents a proof-of-concept of CVE-2023-22527☆12Updated last year
- APK Infrastructure Investigator☆63Updated 2 years ago
- Exploit for Symfony CVE-2024-50340 (forked eos)☆30Updated 8 months ago
- Nuclei template to detect Apache servers vulnerable to CVE-2024-38473☆29Updated 11 months ago
- CVE-2023-20198 & 0Day Implant Scanner☆31Updated 3 months ago
- CVE-2023-26818 Exploit MacOS TCC Bypass W/ Telegram☆18Updated last year
- RepoReaper is an automated tool crafted to meticulously scan and identify exposed .git repositories within specified domains and their su…☆34Updated last year
- The authentication bypass vulnerability in GitHub Enterprise Server (GHES) allows an unauthorized attacker to access an instance of GHES …☆50Updated last year
- Mitigation validation utility for the Ivanti Connect Around attack chain. Runs multiple checks. CVE-2023-46805, CVE-2024-21887.☆12Updated last year