Browser-based iOS IPA security analyzer.
☆58Jan 12, 2026Updated 2 months ago
Alternatives and similar repositories for ipaauditor
Users that are interested in ipaauditor are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- An Android app to easily manage Frida server on your device or emulator☆114Jan 3, 2026Updated 2 months ago
- This tool is designed to seamlessly convert Postman collections into OpenAPI schemas. This conversion is essential for API security testi…☆12Sep 3, 2024Updated last year
- A tool for listing and extracting installed Android APKs and decrypted iOS IPAs (plus app storage) from rooted or jailbroken devices.☆39May 5, 2025Updated 10 months ago
- A lightweight Python-based tool to extract and enumerate Android components and automatically generate practical ADB commands☆111Jun 14, 2025Updated 9 months ago
- ☆16Oct 24, 2018Updated 7 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- A tool for inspecting and analyzing mobile application storage files.☆51May 15, 2025Updated 10 months ago
- AI-powered security code analyzer using local LLMs for semantic vulnerability detection. Unlike traditional SAST tools, FalconEYE reas…☆45Mar 10, 2026Updated 2 weeks ago
- Bitclamp allows arbitrary files to be permanently and anonymously published into the Bitcoin and Dogecoin blockchains.☆14Jan 12, 2017Updated 9 years ago
- A Burp Suite extension for GraphQL security testing.☆60Feb 7, 2026Updated last month
- Search for sensitive data in Postman public library. Original work from https://github.com/cosad3s/postleaks☆31Feb 13, 2026Updated last month
- Agentic C2-style MCP server for Frida instrumentation on rooted Android and jailbroken iOS.☆44Mar 18, 2026Updated last week
- https://z-r0crypt.github.io☆11May 3, 2024Updated last year
- ☆43Aug 12, 2025Updated 7 months ago
- CTF-Writeups☆11Mar 3, 2021Updated 5 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Red Team Stored XSS SVG phishing-companion tool with the ability to serve a malicious login page, or clone an html page and implement cus…☆30Mar 31, 2023Updated 2 years ago
- Formatify is a Burp Suite extension that instantly converts HTTP requests into multiple formats like cURL, Python, PowerShell, and more—s…☆30Sep 23, 2025Updated 6 months ago
- Token Tailor is a Burp Suite Community Edition extension that aims to simplify security testing by automating JWT renewal.☆35Sep 30, 2025Updated 5 months ago
- A proof of concept AMSI & ETW bypass using trampolines for hooking and modifying execution flow☆18Jun 26, 2025Updated 9 months ago
- A collection of tools for managing and automating vulnerability management.☆13Mar 24, 2022Updated 4 years ago
- DomainPasswordSpray is a tool written in PowerShell to perform a password spray attack against users of a domain. By default it will auto…☆14Jul 16, 2025Updated 8 months ago
- 3klector is an automation Recon tool which collecting information about Acquisitions and ASN which related to Big Scope company☆47Sep 19, 2022Updated 3 years ago
- Just a nice little shellcode loader using unconventional methods to avoid using signatured APIs☆24Jul 11, 2025Updated 8 months ago
- Privacy-focused CLI swap tool for Monero (XMR). No KYC, no JavaScript, no logs. Swap XMR anonymously via Tor-friendly .onion endpoints.☆13Mar 18, 2025Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- MacInjector is a tool that lists macOS applications, checks code-signing vulnerabilities, and injects a dynamic library (dylib) into a vu…☆17Oct 8, 2025Updated 5 months ago
- Interactive reference guide for pentesting DevOps pipelines. 60+ tools with attack vectors. Credits: Tom & Colbert from Accenture (Fusion…☆38Oct 8, 2025Updated 5 months ago
- This is where I share code/material shown in my videos☆76Jun 17, 2023Updated 2 years ago
- This tool provides detailed analysis of changes between iOS firmware versions and their potential impact on device functionality.☆13Nov 4, 2024Updated last year
- Bhadra is a Vulnerability Management Platform to handle all security issues☆16Mar 2, 2026Updated 3 weeks ago
- ☆21Mar 24, 2017Updated 9 years ago
- Sniper. Passive Secrets Hunting.🚬☆13Jun 3, 2022Updated 3 years ago
- Crawlex is a powerful Chrome extension designed to assist bug bounty hunters in their work by enabling easy crawling of all possible URLs…☆12May 28, 2023Updated 2 years ago
- PITracker: Detecting Android PendingIntent Vulnerabilities through Intent Flow Analysis☆13Apr 21, 2022Updated 3 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ☆16Aug 25, 2025Updated 7 months ago
- About Recon Tools,Methodology and writeups☆18Dec 16, 2023Updated 2 years ago
- This tools used for Automating finding of subdomain, and checking for alive subdomain, and gathering js files from all the subdomain and …☆23Jun 28, 2024Updated last year
- JSSCM detects expired domains for Stored XSS exploitation during browsing.☆58Apr 3, 2025Updated 11 months ago
- Magento Security Scanner☆13Jan 10, 2022Updated 4 years ago
- An invoice management application built on the MEAN stack with intentional vulnerabilities used to demonstrate insecure configurations an…☆16Sep 4, 2020Updated 5 years ago
- Nmap scripts to detect exchange 0-day (CVE-2022-41082) vulnerability☆80Jan 3, 2023Updated 3 years ago