SwaraVM is a mobile security virtual machine that aggregates tools and resources that are commonly used for network traffic analysis, malware analysis, digital forensics, vulnerability research and exploitation, reverse engineering, mobile and web application assessment, alongside a variety of mobile application practice labs.
☆32Aug 6, 2019Updated 6 years ago
Alternatives and similar repositories for swaraVM
Users that are interested in swaraVM are comparing it to the libraries listed below
Sorting:
- A collection of personal ZAP scripts☆13Apr 10, 2023Updated 2 years ago
- hcidump for android☆10Jan 28, 2015Updated 11 years ago
- Web page preview and analysis tool☆12Jan 11, 2023Updated 3 years ago
- WiP - cve-search next gen☆13Jan 18, 2020Updated 6 years ago
- Auto Web Vulnerability Scanning Framework☆10Feb 3, 2016Updated 10 years ago
- WAF Cookie Fetcher is a Burp Suite extension written in Python, which uses a headless browser to obtain the values of WAF-injected cookie…☆16Jan 16, 2018Updated 8 years ago
- PowerShell module to automate via XMLRPC a remote Metasploit server.☆15May 30, 2014Updated 11 years ago
- An automatic Bot that generates and checks Fortnite gift codes.☆10Jan 9, 2021Updated 5 years ago
- Test domain expiration dates.☆12Dec 2, 2022Updated 3 years ago
- Extract data from a .git directory.☆15Mar 28, 2023Updated 2 years ago
- Mobile Forensic Academic Articles☆13Jun 8, 2017Updated 8 years ago
- Command List for Hashcat and default keyspaces.☆17Feb 13, 2020Updated 6 years ago
- ☆15Jun 17, 2016Updated 9 years ago
- Hourly Checked and Updated IP Ranges of AWS Servers☆20Feb 27, 2024Updated 2 years ago
- ☆15Aug 20, 2019Updated 6 years ago
- sudo-parser is a tool to audit complex sudoers files☆18Nov 2, 2022Updated 3 years ago
- OCL Hashcat username to decrypted password recombiner☆15May 21, 2015Updated 10 years ago
- ☆13Feb 2, 2022Updated 4 years ago
- ☆23Mar 11, 2014Updated 11 years ago
- Judge is a tool for scoring/debugging network services on a CCDC (or similar competition) network.☆21Oct 4, 2017Updated 8 years ago
- Additional Material for the Mobile Forensics Course☆18Jul 10, 2020Updated 5 years ago
- An Open Source Mobile Forensics Investigation Tool for Android Platform☆117Feb 21, 2018Updated 8 years ago
- Python Obfuscator using the Hyperion obfuscation algorythm + .py to .exe☆17Jul 6, 2022Updated 3 years ago
- Automate the creation of Backdoors and postexplotation activities☆23Jun 20, 2022Updated 3 years ago
- Silensec's Nyuki Forensics Investigator (Mobile Forensics)☆45Aug 18, 2017Updated 8 years ago
- Collection of single use scripts I worte for windows forensics☆27Feb 1, 2012Updated 14 years ago
- Bug Bounty Recon Script☆18Aug 14, 2020Updated 5 years ago
- Commands to perform various activities related to penetration testing and red teaming☆21Jan 17, 2020Updated 6 years ago
- #1 DISCORD AIO☆41Mar 10, 2024Updated last year
- ☆19Oct 30, 2020Updated 5 years ago
- Scout - a Contactless Active Reconnaissance Tool☆56Dec 8, 2022Updated 3 years ago
- Python scripts for doing Android or IOS mobile forensics☆25Sep 28, 2016Updated 9 years ago
- Post-Exploitation module for Penetration Tester and Hackers.☆27Dec 29, 2021Updated 4 years ago
- ProcDot Malware Sandbox☆26Jul 28, 2025Updated 7 months ago
- A collection of notes and script that will help you learn basics of hacking with Python☆34Nov 3, 2014Updated 11 years ago
- hostapd and wpa_supplicant 2.7 vulnerable to Mathy's WPA3 bugs☆23Jul 26, 2019Updated 6 years ago
- services-names-wordlist☆84Oct 31, 2025Updated 4 months ago
- Python, C++ and Go☆22Sep 23, 2022Updated 3 years ago
- Automating the SQL Injection through Google dorks.☆26Sep 30, 2022Updated 3 years ago