xtiankisutsa / swaraVMLinks
SwaraVM is a mobile security virtual machine that aggregates tools and resources that are commonly used for network traffic analysis, malware analysis, digital forensics, vulnerability research and exploitation, reverse engineering, mobile and web application assessment, alongside a variety of mobile application practice labs.
☆30Updated 6 years ago
Alternatives and similar repositories for swaraVM
Users that are interested in swaraVM are comparing it to the libraries listed below
Sorting:
- ☆15Updated last year
- Scripts and tool for iOS app reversing☆27Updated 4 years ago
- DPE - Default Password Enumeration☆35Updated 12 years ago
- Open Standard Vulnerability & Compliance Scanner☆46Updated 9 years ago
- SWF Vulnerability & Information Scanner☆19Updated 6 years ago
- Pentest ToolKit☆28Updated 5 years ago
- Various exploits☆10Updated 8 years ago
- Tools, scripts and tips useful during OSINT investigations and reconnaissance.☆13Updated 4 years ago
- ☆20Updated 12 years ago
- Trying to take the dum-dum out of security☆12Updated 8 years ago
- buffer overflow examples☆22Updated 7 years ago
- Find unreferenced AWS S3 buckets which have CloudFront CNAME records pointing to them☆37Updated 7 years ago
- ☆33Updated 8 months ago
- This is a basic example of how to search into Shodan using the ShodanAPI.☆16Updated 11 years ago
- Exploit Research & Development - Ported Exploits☆11Updated 8 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆53Updated 5 years ago
- A meta-scan tool used to kick off a number of command-line security tools during VA/PT work.☆23Updated 3 years ago
- Python driver for Wappalyzer, a web application detection utility.☆11Updated 5 years ago
- SIP hacking tools and scripts☆23Updated 4 years ago
- Notes on offensive training☆16Updated 7 years ago
- Framework designed to automate the process of assembly code injection (trojanising) within Android applications.☆43Updated 2 years ago
- Check your email(s) using popular online services to see if it appears in any data-breach☆30Updated 2 months ago
- ☆23Updated 11 years ago
- iOS forensics utility☆12Updated 7 years ago
- Insecure Vulnerable Android Application that helps to learn hacing and securing apps☆21Updated 10 years ago
- Scripts to clone CA certificates for use in HTTPS client attacks.☆36Updated 5 years ago
- Automated Information Retrieval From APKs For Initial Analysis☆32Updated 8 years ago
- Hunt and Analyze Tor Onion Sites☆23Updated 2 years ago
- HTTP(S) directory/file brute forcer☆21Updated 2 years ago
- automated penetration toolkit☆12Updated 9 years ago