xtiankisutsa / swaraVMView external linksLinks
SwaraVM is a mobile security virtual machine that aggregates tools and resources that are commonly used for network traffic analysis, malware analysis, digital forensics, vulnerability research and exploitation, reverse engineering, mobile and web application assessment, alongside a variety of mobile application practice labs.
☆32Aug 6, 2019Updated 6 years ago
Alternatives and similar repositories for swaraVM
Users that are interested in swaraVM are comparing it to the libraries listed below
Sorting:
- A collection of personal ZAP scripts☆13Apr 10, 2023Updated 2 years ago
- Windows Thingies in Python for live use.☆24Apr 22, 2019Updated 6 years ago
- Decloak Linux stealth rootkits hiding data with this simple memory mapped IO investigation tool.☆29Sep 29, 2025Updated 4 months ago
- PowerShell module to automate via XMLRPC a remote Metasploit server.☆15May 30, 2014Updated 11 years ago
- WiP - cve-search next gen☆13Jan 18, 2020Updated 6 years ago
- WAF Cookie Fetcher is a Burp Suite extension written in Python, which uses a headless browser to obtain the values of WAF-injected cookie…☆16Jan 16, 2018Updated 8 years ago
- Rootkit breaker - experimental Linux anti-rootkit tool based on kprobes☆12Sep 30, 2020Updated 5 years ago
- Auto Web Vulnerability Scanning Framework☆10Feb 3, 2016Updated 10 years ago
- Extract data from a .git directory.☆15Mar 28, 2023Updated 2 years ago
- Test domain expiration dates.☆12Dec 2, 2022Updated 3 years ago
- An automatic Bot that generates and checks Fortnite gift codes.☆10Jan 9, 2021Updated 5 years ago
- ☆15Jun 17, 2016Updated 9 years ago
- Magellan PoC☆34Jan 23, 2019Updated 7 years ago
- Command List for Hashcat and default keyspaces.☆17Feb 13, 2020Updated 6 years ago
- Mobile Forensic Academic Articles☆13Jun 8, 2017Updated 8 years ago
- macOS Artifact Intelligence Tool☆13Apr 30, 2019Updated 6 years ago
- sudo-parser is a tool to audit complex sudoers files☆18Nov 2, 2022Updated 3 years ago
- ☆15Apr 20, 2022Updated 3 years ago
- Creates a series of empty folders named after default keyspaces.☆12Nov 13, 2015Updated 10 years ago
- Judge is a tool for scoring/debugging network services on a CCDC (or similar competition) network.☆21Oct 4, 2017Updated 8 years ago
- Simple mods to wpa_supplicant to allow more efficient online bruting☆19Aug 23, 2019Updated 6 years ago
- Additional Material for the Mobile Forensics Course☆19Jul 10, 2020Updated 5 years ago
- An Open Source Mobile Forensics Investigation Tool for Android Platform☆116Feb 21, 2018Updated 7 years ago
- Automate the creation of Backdoors and postexplotation activities☆23Jun 20, 2022Updated 3 years ago
- Python Obfuscator using the Hyperion obfuscation algorythm + .py to .exe☆17Jul 6, 2022Updated 3 years ago
- Collection of single use scripts I worte for windows forensics☆27Feb 1, 2012Updated 14 years ago
- Commands to perform various activities related to penetration testing and red teaming☆20Jan 17, 2020Updated 6 years ago
- ☆21Mar 5, 2022Updated 3 years ago
- #1 DISCORD AIO☆41Mar 10, 2024Updated last year
- Scout - a Contactless Active Reconnaissance Tool☆56Dec 8, 2022Updated 3 years ago
- Post-Exploitation module for Penetration Tester and Hackers.☆27Dec 29, 2021Updated 4 years ago
- Analyze an APK archive.☆28Feb 24, 2024Updated last year
- Python scripts for doing Android or IOS mobile forensics☆24Sep 28, 2016Updated 9 years ago
- ProcDot Malware Sandbox☆26Jul 28, 2025Updated 6 months ago
- hostapd and wpa_supplicant 2.7 vulnerable to Mathy's WPA3 bugs☆23Jul 26, 2019Updated 6 years ago
- Full Deobfuscator for PEUnion 4.0.0 (.NET & PE32)☆23Apr 21, 2022Updated 3 years ago
- Python, C++ and Go☆22Sep 23, 2022Updated 3 years ago
- StaDynA: Addressing the Problem of Dynamic Code Updates in the Security Analysis of Android Applications☆25Apr 1, 2023Updated 2 years ago
- Automating the SQL Injection through Google dorks.☆26Sep 30, 2022Updated 3 years ago