xtiankisutsa / swaraVMLinks
SwaraVM is a mobile security virtual machine that aggregates tools and resources that are commonly used for network traffic analysis, malware analysis, digital forensics, vulnerability research and exploitation, reverse engineering, mobile and web application assessment, alongside a variety of mobile application practice labs.
☆30Updated 6 years ago
Alternatives and similar repositories for swaraVM
Users that are interested in swaraVM are comparing it to the libraries listed below
Sorting:
- Scripts and tool for iOS app reversing☆27Updated 3 years ago
- SWF Vulnerability & Information Scanner☆19Updated 6 years ago
- Exploit Research & Development - Ported Exploits☆11Updated 8 years ago
- Various exploits☆10Updated 8 years ago
- Tools, scripts and tips useful during OSINT investigations and reconnaissance.☆13Updated 4 years ago
- buffer overflow examples☆22Updated 7 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆53Updated 4 years ago
- Open Standard Vulnerability & Compliance Scanner☆45Updated 9 years ago
- DPE - Default Password Enumeration☆35Updated 12 years ago
- Check All APK's -- scripts for checking your phone for malware☆30Updated 8 years ago
- Find unreferenced AWS S3 buckets which have CloudFront CNAME records pointing to them☆37Updated 7 years ago
- HTTP(S) directory/file brute forcer☆21Updated 2 years ago
- Notes on offensive training☆16Updated 7 years ago
- Pentest ToolKit☆28Updated 5 years ago
- ☆16Updated last year
- Supermicro IPMI/BMC Cleartext Password Scanner☆40Updated 10 years ago
- Open-source Exploiting Framework☆30Updated 8 years ago
- Slap the hell outta GitHub by harvesting emails by crunching through commits. The Dope OSINT tool.☆13Updated 7 years ago
- The Hall of Ancient Exploitation Tools☆16Updated 5 years ago
- Python 3 update for https://code.google.com/archive/p/goofile/☆15Updated 6 years ago
- Passive Spider uses search engines to find interesting information about a target domain.☆13Updated 7 years ago
- ☆23Updated 11 years ago
- A collection of tools adversaries commonly use in an attack.☆14Updated 9 months ago
- Hunt and Analyze Tor Onion Sites☆23Updated 2 years ago
- SIP hacking tools and scripts☆23Updated 4 years ago
- ☆33Updated 7 months ago
- ☆20Updated 11 years ago
- This is a basic example of how to search into Shodan using the ShodanAPI.☆16Updated 11 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆22Updated 6 years ago
- Check your email(s) using popular online services to see if it appears in any data-breach☆30Updated 2 months ago