whb224117 / MobileApp-Pentest-CheatsheetLinks
The Mobile App Pentest cheat sheet was created to provide concise collection of high value information on specific mobile application penetration testing topics.
☆10Updated 9 years ago
Alternatives and similar repositories for MobileApp-Pentest-Cheatsheet
Users that are interested in MobileApp-Pentest-Cheatsheet are comparing it to the libraries listed below
Sorting:
- OWASP Foundation Web Respository☆36Updated 4 years ago
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆47Updated 5 years ago
- Bash tool used for proactive detection of malicious activity on macOS systems.☆38Updated 3 months ago
- Apache (Linux) CVE-2021-41773/2021-42013 Mass Vulnerability Checker☆22Updated 4 years ago
- Small python script wrapper for automating hashcat commands☆38Updated 5 years ago
- Mole is a framework for identifying and exploiting out-of-band application vulnerabilities.☆58Updated 5 years ago
- Red Team tool for exfiltrating the target organization's Google People Directory that you have access to, via Google's API.☆58Updated 4 years ago
- Super organized and flexible script for sending phishing campaigns☆56Updated 4 years ago
- Sp00fer blog post -☆24Updated 3 years ago
- EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicated…☆24Updated 3 years ago
- A tool that automates the trevorc2 powershell agent obfuscation process with the pyfuscation tool☆15Updated 2 years ago
- Just another vulnerable web application.☆36Updated last year
- Modular framework to exploit UPS devices☆65Updated 2 years ago
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆38Updated 3 years ago
- Post-exploitation tool☆26Updated 4 years ago
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆10Updated 3 years ago
- Central IoC scanner based on Loki☆20Updated 4 years ago
- wpscvn is a tool for pentesters, website owner to test if their websites had some vulnerable plugins or themes☆15Updated 7 years ago
- WIP Post-exploitation framework tailored for hypervisors.☆50Updated 2 years ago
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆26Updated 2 years ago
- Reflected Cross-Site Scripting (XSS) vulnerability in 'index.php' login-portal webpage of SourceCodesters Tailor Management System v1.0 a…☆25Updated 5 years ago
- Repo for all the Recon and enum techniques, Exploitation, Priv-escalation (Linux and Windows), post exploitation☆16Updated 4 months ago
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆31Updated last year
- ☆26Updated 3 years ago
- ☆19Updated 5 years ago
- This tool is useful to find a particular string in a list of URLs using tesseract's OCR (Optical Character Recognition) capabilities☆32Updated 4 years ago
- CIS Benchmark testing of Windows SIEM configuration☆45Updated 2 years ago
- Data exfiltration utility for testing detection capabilities☆57Updated 4 years ago
- A Python script that gathers all valid IP addresses from all text files from a directory, and checks them against Whois database, TOR rel…☆29Updated 3 years ago
- This Buffer Overflow Toolkit works through FTP, SMTP, POP, HTTP protocols as well file outputs for playlists exploiting customized variab…☆18Updated 4 years ago