Android Pentest Setup Environment
☆30May 9, 2022Updated 3 years ago
Alternatives and similar repositories for Android_install
Users that are interested in Android_install are comparing it to the libraries listed below
Sorting:
- To run Burpsuite from launcher, You may run it in terminal by script, But by this tool you will able to run it from Launcher with a Burp …☆11Sep 24, 2023Updated 2 years ago
- ☆15Jul 3, 2025Updated 7 months ago
- Damn Vulnerable PHP Application (DVPA) - It is Lab Written in The PHP lang, Which Contains PHP Type Juggling - RCE Challenges☆32May 18, 2022Updated 3 years ago
- PowerShell script that will enumerate the methods and properties on all WMIObjects☆11Jul 18, 2018Updated 7 years ago
- ☆12Jan 4, 2022Updated 4 years ago
- ☆12Jan 30, 2025Updated last year
- Automated Pentest Recon Scanner☆14Oct 6, 2017Updated 8 years ago
- Pentesting Mobile apps and resources www.sniferl4bs.com☆39Jul 10, 2021Updated 4 years ago
- ☆14Feb 23, 2023Updated 3 years ago
- This map lists the essential techniques to bypass anti-virus and EDR☆15Aug 9, 2023Updated 2 years ago
- The official exploit for Open-AudIT v3.3.1 Remote Code Execution CVE-2020-12078☆18Apr 28, 2020Updated 5 years ago
- 一个集和多线程 批量验证 poc验证 存活测试 备份文件探测 后台探测 渗透测试框架。☆18May 8, 2022Updated 3 years ago
- Tool to automate corporate network segmentation test☆21Aug 6, 2020Updated 5 years ago
- Slides and other material from various conference presentations.☆46Sep 10, 2025Updated 5 months ago
- moniorg is a tool that leverages crt.sh website to monitor domains of a target☆47Apr 1, 2023Updated 2 years ago
- ☆28Oct 15, 2025Updated 4 months ago
- ☆20May 25, 2025Updated 9 months ago
- A learning and testing environment for web application hacking and pentesting.☆27Jan 2, 2021Updated 5 years ago
- This project provides Base64 encoding and decoding functionality to PowerShell within Constrained Language Mode☆27Jun 25, 2024Updated last year
- A list of commands, scripts, resources, and more that I have gathered and attempted to consolidate for use as OSCP (and more) study mater…☆26Oct 4, 2019Updated 6 years ago
- Vulnerability Cheatsheet☆54Apr 22, 2022Updated 3 years ago
- My malware analysis code snippets☆28Jul 15, 2023Updated 2 years ago
- ☆101Oct 18, 2023Updated 2 years ago
- An astronomical collection of space-related cybersecurity tools 🚀✨☆25Jul 9, 2023Updated 2 years ago
- ☆11Sep 26, 2021Updated 4 years ago
- Mobile Pentesting Guide (WIP)☆25May 13, 2020Updated 5 years ago
- commands☆27Nov 5, 2020Updated 5 years ago
- ☆24Feb 7, 2025Updated last year
- Cloud-based AD lab created to help you test real attacks in a controlled environment and create detection rules for them☆29Feb 23, 2024Updated 2 years ago
- Python Script to Print the name of the companies that are acquired by a Target Company and the Time of Acquisition.☆26Dec 5, 2021Updated 4 years ago
- CRUD básico em PHP com um sistema de cadastro de clientes.☆13May 19, 2021Updated 4 years ago
- Online diary is a PHP app by which you can write your feeling and keep it private or share with people and you can also read other post o…☆10Jul 5, 2015Updated 10 years ago
- Static and dynamic Android application security analysis☆76Jun 2, 2024Updated last year
- Schedule one task every day at the same time. Deepsleep inbetween☆31Dec 5, 2025Updated 2 months ago
- BetterBugBounty - Here tools are classic, bugs are hunted, and nostalgia is the ultimate weapon!☆29Feb 10, 2024Updated 2 years ago
- Código fonte da calculadora de IMC☆13Oct 16, 2019Updated 6 years ago
- ☆11Feb 21, 2026Updated last week
- Wordpress - Joomla - OpenCart - Drupal CMS Bruter☆11Jul 26, 2022Updated 3 years ago
- Jeeves SQLI Finder☆215May 13, 2022Updated 3 years ago