xtiankisutsa / swaraVMLinks
SwaraVM is a mobile security virtual machine that aggregates tools and resources that are commonly used for network traffic analysis, malware analysis, digital forensics, vulnerability research and exploitation, reverse engineering, mobile and web application assessment, alongside a variety of mobile application practice labs.
☆29Updated 6 years ago
Alternatives and similar repositories for swaraVM
Users that are interested in swaraVM are comparing it to the libraries listed below
Sorting:
- Scripts and tool for iOS app reversing☆27Updated 3 years ago
- DPE - Default Password Enumeration☆34Updated 12 years ago
- Pentest ToolKit☆28Updated 5 years ago
- SWF Vulnerability & Information Scanner☆19Updated 6 years ago
- Wireless Miniaturized Device☆19Updated 7 years ago
- Tools, scripts and tips useful during OSINT investigations and reconnaissance.☆13Updated 4 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆52Updated 4 years ago
- Open Standard Vulnerability & Compliance Scanner☆44Updated 9 years ago
- Slap the hell outta GitHub by harvesting emails by crunching through commits. The Dope OSINT tool.☆13Updated 6 years ago
- Python 3 update for https://code.google.com/archive/p/goofile/☆15Updated 5 years ago
- SIP hacking tools and scripts☆23Updated 4 years ago
- Various exploits☆10Updated 8 years ago
- Notes on offensive training☆16Updated 7 years ago
- Find unreferenced AWS S3 buckets which have CloudFront CNAME records pointing to them☆37Updated 7 years ago
- The Hall of Ancient Exploitation Tools☆16Updated 5 years ago
- ☆23Updated 11 years ago
- A collection of tools adversaries commonly use in an attack.☆14Updated 8 months ago
- Android Connections Forensics☆33Updated 9 years ago
- ☆33Updated 6 months ago
- This is a basic example of how to search into Shodan using the ShodanAPI.☆16Updated 11 years ago
- buffer overflow examples☆22Updated 7 years ago
- Exploit Research & Development - Ported Exploits☆11Updated 8 years ago
- Hunt and Analyze Tor Onion Sites☆23Updated 2 years ago
- Vulnerability Scanner☆11Updated 10 years ago
- Trying to take the dum-dum out of security☆11Updated 7 years ago
- Autopsy plugin to extract information from the 'Your Phone' Windows 10 App☆13Updated 4 years ago
- Automated Information Retrieval From APKs For Initial Analysis☆32Updated 7 years ago
- Check your email(s) using popular online services to see if it appears in any data-breach☆31Updated 3 weeks ago
- A tool to discover bygonessl vulnerabilities using the facebook API☆20Updated 5 years ago
- (Abandoned) Extract packages from an Android device☆51Updated 4 years ago