xtiankisutsa / swaraVMLinks
SwaraVM is a mobile security virtual machine that aggregates tools and resources that are commonly used for network traffic analysis, malware analysis, digital forensics, vulnerability research and exploitation, reverse engineering, mobile and web application assessment, alongside a variety of mobile application practice labs.
☆32Updated 6 years ago
Alternatives and similar repositories for swaraVM
Users that are interested in swaraVM are comparing it to the libraries listed below
Sorting:
- Scripts and tool for iOS app reversing☆27Updated 4 years ago
- DPE - Default Password Enumeration☆36Updated 12 years ago
- Passive Spider uses search engines to find interesting information about a target domain.☆13Updated 7 years ago
- ☆20Updated 12 years ago
- SWF Vulnerability & Information Scanner☆19Updated 7 years ago
- SIP hacking tools and scripts☆23Updated 5 years ago
- Open-source Exploiting Framework☆30Updated 8 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆53Updated 5 years ago
- Open Standard Vulnerability & Compliance Scanner☆46Updated 10 years ago
- This is a basic example of how to search into Shodan using the ShodanAPI.☆16Updated 11 years ago
- Exploit Research & Development - Ported Exploits☆11Updated 8 years ago
- Scripts to clone CA certificates for use in HTTPS client attacks.☆36Updated 5 years ago
- Vulnerability Scanner☆11Updated 10 years ago
- Wireless Miniaturized Device☆19Updated 7 years ago
- Tools, scripts and tips useful during OSINT investigations and reconnaissance.☆13Updated 4 years ago
- The repository for Building visualisation platforms for OSINT data using open source solutions☆30Updated 7 years ago
- Find unreferenced AWS S3 buckets which have CloudFront CNAME records pointing to them☆37Updated 7 years ago
- The Hall of Ancient Exploitation Tools☆16Updated 6 years ago
- Various exploits☆10Updated 8 years ago
- A meta-scan tool used to kick off a number of command-line security tools during VA/PT work.☆23Updated 3 years ago
- Pentest ToolKit☆28Updated 5 years ago
- buffer overflow examples☆22Updated 7 years ago
- Check All APK's -- scripts for checking your phone for malware☆30Updated 8 years ago
- Cloud metadata extraction tools and scripts☆34Updated 2 years ago
- ☆17Updated last year
- Brute force password selection for EAP-MD5 authentication exchanges☆26Updated 8 years ago
- (Abandoned) Extract packages from an Android device☆52Updated 4 years ago
- ☆12Updated 11 years ago
- Automated Information Retrieval From APKs For Initial Analysis☆32Updated 8 years ago
- ☆33Updated 10 months ago