terry2012 / BlueBorneVulnScannerLinks
A brief analysis of the BlueBorne Vulnerability Scanner app by Armis
☆24Updated 8 years ago
Alternatives and similar repositories for BlueBorneVulnScanner
Users that are interested in BlueBorneVulnScanner are comparing it to the libraries listed below
Sorting:
- Metasploit Exploit Module for the Android addJavascriptInterface Issue (MITM)☆36Updated 10 years ago
- This repository contains various shell scripts and tips and tricks used for packaging androidtamer packages☆13Updated 3 years ago
- A fuzzing utility for Android that focuses on reporting and delivery portions of the fuzzing process☆39Updated 11 years ago
- Dynamic android vulnerability scanner using OpenNebula and Android-x86 emulators.☆42Updated 8 years ago
- Automated Information Retrieval From APKs For Initial Analysis☆32Updated 8 years ago
- ☆24Updated 8 years ago
- Proof of Concepts, Exploits☆28Updated 8 months ago
- A tool for enumerating the effective privileges of processes on an Android device.☆53Updated 11 years ago
- A fuzzing script for MitmProxy☆24Updated 10 years ago
- Framework for static and dynamic analysis in Android APKs☆32Updated 8 years ago
- ☆44Updated 11 years ago
- ISR-sqlget It's a blind SQL injection tool developed in Perl.☆14Updated 12 years ago
- Some Of Huawei Routers Exploits☆13Updated 9 years ago
- Faraday Workspaces for Bug Bounties☆21Updated 9 years ago
- Source code for the beta release of CobraDroid☆14Updated 5 years ago
- Blueborne CVE-2017-1000251 PoC for linux machines☆17Updated 2 years ago
- ☆22Updated 6 years ago
- FUD Metasploit Android Payload☆11Updated 10 years ago
- A security write-up about the Paypal API & data leakage☆25Updated 9 years ago
- PoC code for android RCE with multidex and ZIP files☆40Updated 9 years ago
- Malware detection using learning and information retrieval for Android☆73Updated 5 years ago
- Portable utility to check if a machine has been infected by Shamoon2☆15Updated 8 years ago
- An experiment into dynamic hooking and modification of Android application functions and return values.☆33Updated 8 years ago
- How to write basic memory corruption exploits on Windows☆28Updated 9 years ago
- ☆12Updated 9 years ago
- HackSys Extreme Vulnerable Driver - ArbitraryOverwrite Exploit☆26Updated 8 years ago
- Archive Mirror for recently republished PoC/Exploit code☆20Updated 8 years ago
- Volatility plugin to extract X screenshots from a memory dump☆37Updated 7 years ago
- A tool that enumerates Android devices for information useful in understanding its internals and for exploit development. It supports and…☆55Updated 8 years ago
- Microsoft Office / COM Object DLL Planting☆15Updated 9 years ago