thecybersandeep / ipaauditorView external linksLinks
Browser-based iOS IPA security analyzer.
☆48Jan 12, 2026Updated last month
Alternatives and similar repositories for ipaauditor
Users that are interested in ipaauditor are comparing it to the libraries listed below
Sorting:
- Browser-based Android security auditing tool.☆59Feb 6, 2026Updated last week
- An Android app to easily manage Frida server on your device or emulator☆107Jan 3, 2026Updated last month
- Bitclamp allows arbitrary files to be permanently and anonymously published into the Bitcoin and Dogecoin blockchains.☆14Jan 12, 2017Updated 9 years ago
- Remote C2-style MCP server for Frida instrumentation on rooted Android☆30Jan 31, 2026Updated 2 weeks ago
- AI-powered security code analyzer using local LLMs for semantic vulnerability detection. Unlike traditional SAST tools, FalconEYE reas…☆25Feb 9, 2026Updated last week
- ☆42Aug 12, 2025Updated 6 months ago
- A lightweight Python-based tool to extract and enumerate Android components and automatically generate practical ADB commands☆106Jun 14, 2025Updated 8 months ago
- Token Tailor is a Burp Suite Community Edition extension that aims to simplify security testing by automating JWT renewal.☆35Sep 30, 2025Updated 4 months ago
- Red Team Stored XSS SVG phishing-companion tool with the ability to serve a malicious login page, or clone an html page and implement cus…☆30Mar 31, 2023Updated 2 years ago
- Capture all RabbitMQ messages being sent through a broker.☆32Feb 13, 2021Updated 5 years ago
- This tool is an efficient scanner designed to detect Cache Deception vulnerabilities in web servers. It automates the process of testing …☆35Jan 14, 2026Updated last month
- Search for sensitive data in Postman public library. Original work from https://github.com/cosad3s/postleaks☆30Oct 11, 2023Updated 2 years ago
- A tool for listing and extracting installed Android APKs and decrypted iOS IPAs (plus app storage) from rooted or jailbroken devices.☆38May 5, 2025Updated 9 months ago
- This is where I share code/material shown in my videos☆76Jun 17, 2023Updated 2 years ago
- ☆25Jan 19, 2026Updated 3 weeks ago
- Generate a root CA and create a signed subordinate CA from the generated AWS PCA (Private Certificate Authority) CSR☆11Jan 16, 2019Updated 7 years ago
- ☆11Nov 11, 2023Updated 2 years ago
- Hide your Ass by changing Public IP and userAgents in every 10 seconds - CYBERSECURITY☆10Feb 19, 2023Updated 2 years ago
- Powerful Wireless Network Auditing Framework - 2023☆10Sep 10, 2023Updated 2 years ago
- Bhadra is a Vulnerability Management Platform to handle all security issues☆15Sep 23, 2025Updated 4 months ago
- Raven is a powerful and customizable web crawler written in Go.☆41Sep 3, 2024Updated last year
- ☆12Nov 8, 2023Updated 2 years ago
- The OWASP Testing Guide v4.2 Checlist [2023]☆13Jan 15, 2023Updated 3 years ago
- ☆11Jul 10, 2024Updated last year
- Take control of a remote machine using reverse shells in python(The hacking side of python)☆10May 23, 2023Updated 2 years ago
- ☆11Jan 24, 2023Updated 3 years ago
- A CommonJS library for working with Common Vulnerability Scoring System vectors and scores.☆12Jul 14, 2022Updated 3 years ago
- ☆11Feb 3, 2026Updated last week
- ☆12Sep 18, 2015Updated 10 years ago
- GHUStereo models are novel real-time stereo matching architectures with a low computation complexity characterized by compact cost volum…☆29Dec 14, 2025Updated 2 months ago
- A tweak to inspect any application (user or system application). Inspect views, network, local variables, NSUserDefault and even more.☆13Aug 20, 2019Updated 6 years ago
- Queries to use on the store.cloudphotodb database. Provides you with iCloud Photos Sync directions and other information☆12Sep 4, 2023Updated 2 years ago
- maker100-robotics-iot-machine-learning-curriculum☆14Updated this week
- ☆16Aug 25, 2025Updated 5 months ago
- scripts to create zip bombs☆12Nov 26, 2012Updated 13 years ago
- A list of CVE's with Proof of Concepts☆11Jun 17, 2021Updated 4 years ago
- Python Tape Manager☆14Sep 10, 2025Updated 5 months ago
- This tool is designed to seamlessly convert Postman collections into OpenAPI schemas. This conversion is essential for API security testi…☆12Sep 3, 2024Updated last year
- Kentico <=12.0.14 is vulnerable to a remote code execution via the SyncServer☆10Sep 28, 2020Updated 5 years ago