My thesis of me and my friend. Subject for Android security
☆14Sep 19, 2019Updated 6 years ago
Alternatives and similar repositories for Android-Pentest-Suite
Users that are interested in Android-Pentest-Suite are comparing it to the libraries listed below
Sorting:
- This repository mainly focuses on various techniques, tools, frameworks and approach to perform offensive exploitation of AWS infrastruct…☆12Jun 12, 2019Updated 6 years ago
- Pw0 Framewrok - magical android pentest app 🔮! Pixie Dust, Handshakes, Deauth, Nmap, Port scanner and more!☆18Aug 8, 2021Updated 4 years ago
- 🤖 Intelligent AI-powered PCB design automation tool using machine learning for component placement, routing optimization, and signal int…☆30Aug 15, 2025Updated 6 months ago
- Some notes written during my OSCP Journey (KeepNote project)☆10Mar 2, 2020Updated 6 years ago
- OWASP Coimbatore's Web & Project Repository☆13Jan 23, 2026Updated last month
- Starter Projects for the Docker Course☆11Dec 25, 2025Updated 2 months ago
- Tools Installer From Indonesia security Lite☆10May 30, 2018Updated 7 years ago
- My blog☆10Oct 6, 2025Updated 5 months ago
- Email OSINT and password breach hunting. Use h8mail to find passwords through different breach and reconnaissance services, or the infamo…☆10Jun 12, 2019Updated 6 years ago
- Training and certifications related to secure software development☆11Feb 9, 2026Updated last month
- ☆12Mar 31, 2021Updated 4 years ago
- AWS container security survey 2020☆11Dec 2, 2020Updated 5 years ago
- The script for installing SurrealDB on windows operating systems☆13Mar 12, 2025Updated 11 months ago
- ☆10Aug 28, 2020Updated 5 years ago
- The source for the various recovery images by amon_ra for Android phones. See wiki for branch descriptions. Additional binaries can be bu…☆41May 30, 2010Updated 15 years ago
- It contain google dork to find the wsdl file.☆13May 27, 2020Updated 5 years ago
- ☆20Jan 12, 2022Updated 4 years ago
- Chef library cookbook for managing AWS Security Groups☆11Sep 7, 2016Updated 9 years ago
- Simple script for testing CVE-2016-2402 and similar flaws☆13Mar 30, 2016Updated 9 years ago
- Publishing advisories for CVEs found by POST Cyberforce☆13Jan 7, 2025Updated last year
- ☆10May 6, 2017Updated 8 years ago
- Tools and Scripts used in CRTP☆12Apr 27, 2020Updated 5 years ago
- This Log4j RCE exploit originated from https://github.com/tangxiaofeng7/CVE-2021-44228-Apache-Log4j-Rce☆10Dec 16, 2021Updated 4 years ago
- ☆15Jul 3, 2025Updated 8 months ago
- This repository contains fully disclosed accepted reports for the null Ahmedabad's Bug Bounty CTF.☆10Oct 31, 2023Updated 2 years ago
- Python based Web Scraper which can discover JavaScript files and parse them for juicy information (API keys, IP's, Hidden Paths etc)☆16Feb 17, 2022Updated 4 years ago
- Collection of resources for responding to the Log4j set of vulnerabilities.☆11Feb 22, 2022Updated 4 years ago
- Knowledge base for reverse engineering and malware analysis☆15Jan 11, 2026Updated last month
- ☆11Jan 24, 2023Updated 3 years ago
- Wireless pentesting tool with functionalities such as password cracking (in WEP and WPA/WPA2 networks), DoS attacks, client de-authentica…☆12Apr 8, 2024Updated last year
- Simple Bot Alice open source☆21Sep 4, 2019Updated 6 years ago
- Chatbot with Gemini Pro☆12Feb 9, 2024Updated 2 years ago
- Source code related of the articles posted in medium.com☆12Nov 2, 2020Updated 5 years ago
- SnoopSnitch Extended (support) Lite☆50Jun 15, 2017Updated 8 years ago
- Admin for☆16Jun 3, 2018Updated 7 years ago
- 安卓activity劫持演示demo,包含指定activity位于前台时的劫持和指定进程位于前台时的劫持☆15Dec 20, 2018Updated 7 years ago
- Java / Spring for Raspberry Pi GPIO, remote controlled microphone stand☆14Jun 29, 2017Updated 8 years ago
- A CLI that utilizes Okta IdP via SAML to acquire temporary AWS credentials☆10Jun 30, 2021Updated 4 years ago
- Here you will find information and examples about the most known vulnerabilities in the Bug Bounty world! [ EN ESPAÑOL ]☆14Oct 23, 2021Updated 4 years ago