Android Pentest Setup Environment
☆30May 9, 2022Updated 3 years ago
Alternatives and similar repositories for Android_install
Users that are interested in Android_install are comparing it to the libraries listed below
Sorting:
- ☆12Jan 4, 2022Updated 4 years ago
- To run Burpsuite from launcher, You may run it in terminal by script, But by this tool you will able to run it from Launcher with a Burp …☆11Sep 24, 2023Updated 2 years ago
- ☆15Jul 3, 2025Updated 8 months ago
- Damn Vulnerable PHP Application (DVPA) - It is Lab Written in The PHP lang, Which Contains PHP Type Juggling - RCE Challenges☆32May 18, 2022Updated 3 years ago
- ☆101Oct 18, 2023Updated 2 years ago
- Penetration Testing and Offensive Security Interview Questions☆174May 17, 2022Updated 3 years ago
- Automated Pentest Recon Scanner☆14Oct 6, 2017Updated 8 years ago
- ☆12Jan 30, 2025Updated last year
- A collection of open source threat detection rules created by Cyber Castle's team.☆14Jun 2, 2022Updated 3 years ago
- PowerShell script that will enumerate the methods and properties on all WMIObjects☆11Jul 18, 2018Updated 7 years ago
- Pentesting Mobile apps and resources www.sniferl4bs.com☆39Jul 10, 2021Updated 4 years ago
- ☆45Jun 5, 2021Updated 4 years ago
- Rodan Exploitation Framework☆103Dec 1, 2025Updated 3 months ago
- This map lists the essential techniques to bypass anti-virus and EDR☆15Aug 9, 2023Updated 2 years ago
- moniorg is a tool that leverages crt.sh website to monitor domains of a target☆47Apr 1, 2023Updated 2 years ago
- This repository provides examples of Vulnerable and Mitigated code as per CWE Categorization.☆23May 4, 2024Updated last year
- Vulnerability Cheatsheet☆54Apr 22, 2022Updated 3 years ago
- Work-in-progress for the official camera module from the Raspberry Pi Foundation☆30Jan 11, 2016Updated 10 years ago
- Slides and other material from various conference presentations.☆46Sep 10, 2025Updated 6 months ago
- Mobile Pentesting Guide (WIP)☆26May 13, 2020Updated 5 years ago
- An astronomical collection of space-related cybersecurity tools 🚀✨☆25Jul 9, 2023Updated 2 years ago
- XSS Finder Via SSTI☆56Sep 14, 2023Updated 2 years ago
- Just a bunch of useful scripts for netsec/admin/others☆16Dec 9, 2025Updated 3 months ago
- The offical exploit for Pandora v7.0NG Post-auth Remote Code Execution CVE-2019-20224☆14Jan 10, 2020Updated 6 years ago
- Find unicode codepoints to use in normalisation and transformation attacks.☆11Mar 15, 2021Updated 5 years ago
- CVE-2020-25223☆11Sep 13, 2021Updated 4 years ago
- SetMyKali is a bash based tool to configure and customize kali linux☆69Apr 8, 2022Updated 3 years ago
- BetterBugBounty - Here tools are classic, bugs are hunted, and nostalgia is the ultimate weapon!☆29Feb 10, 2024Updated 2 years ago
- Static and dynamic Android application security analysis☆76Jun 2, 2024Updated last year
- ☆15Feb 23, 2023Updated 3 years ago
- ShoLister is a tool that collects all available subdomains for specific hostname or organization from Shodan. The tool is designed to be …☆60May 10, 2022Updated 3 years ago
- Extract the best title value from within HTML head elements.☆17Apr 17, 2023Updated 2 years ago
- string/file/shellcode encryptor using AES/XOR☆11Oct 15, 2023Updated 2 years ago
- A list of commands, scripts, resources, and more that I have gathered and attempted to consolidate for use as OSCP (and more) study mater…☆26Oct 4, 2019Updated 6 years ago
- A playground to practice SSRF Attacks against web apps☆17Oct 15, 2018Updated 7 years ago
- The official exploit for OCS Inventory NG v2.7 Remote Command Execution CVE-2020-14947☆19Jul 2, 2020Updated 5 years ago
- Subdomain Takeover tool with web UI☆57Feb 24, 2023Updated 3 years ago
- use express middleware on socket.io namespaces☆10Aug 25, 2018Updated 7 years ago
- Jeeves SQLI Finder☆216May 13, 2022Updated 3 years ago