xtiankisutsa / swaraVM
SwaraVM is a mobile security virtual machine that aggregates tools and resources that are commonly used for network traffic analysis, malware analysis, digital forensics, vulnerability research and exploitation, reverse engineering, mobile and web application assessment, alongside a variety of mobile application practice labs.
☆29Updated 5 years ago
Alternatives and similar repositories for swaraVM:
Users that are interested in swaraVM are comparing it to the libraries listed below
- ☆18Updated last year
- Autopsy plugin to extract information from the 'Your Phone' Windows 10 App☆13Updated 4 years ago
- iOS forensics utility☆12Updated 7 years ago
- Various exploits☆10Updated 8 years ago
- Collection of cracked malware☆14Updated 6 years ago
- Trying to take the dum-dum out of security☆11Updated 7 years ago
- Test Android Application.☆19Updated 9 years ago
- Slap the hell outta GitHub by harvesting emails by crunching through commits. The Dope OSINT tool.☆13Updated 6 years ago
- Various Crypter Project☆9Updated 11 years ago
- SPIZZLE, The Onion Spider.☆13Updated 7 years ago
- Automated Information Retrieval From APKs For Initial Analysis☆32Updated 7 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 4 years ago
- Shellcode / Buffer Overflow 💣☆20Updated 4 years ago
- repo with compromised keys and such☆21Updated 2 years ago
- A recon-ng module for crawling Indeed.com for contacts and resumes.☆12Updated 9 years ago
- This is a basic example of how to search into Shodan using the ShodanAPI.☆16Updated 11 years ago
- Pentest ToolKit☆28Updated 5 years ago
- ☆18Updated 5 years ago
- Convert Windows Netmon Monitor Mode Wireless Packet Captures to Libpcap Format☆15Updated 5 years ago
- personal fork of OSINT tool recon-ng☆18Updated 7 years ago
- Scripts and tool for iOS app reversing☆24Updated 3 years ago
- Wireless Miniaturized Device☆19Updated 7 years ago
- Black-Box Penetration Testing and Vulnerability Management Platform, Bachelor's Thesis☆11Updated 8 years ago
- buffer overflow examples☆22Updated 7 years ago
- Framework for Making Environmental Keyed Payloads☆13Updated 8 years ago
- (Abandoned) Extract packages from an Android device☆51Updated 4 years ago
- SWF Vulnerability & Information Scanner☆20Updated 6 years ago
- Collection of exploits that were verified by an automated system☆13Updated 3 years ago
- ☆33Updated 3 months ago
- A tool that enumerates Android devices for information useful in understanding its internals and for exploit development. It supports and…☆52Updated 7 years ago