xtiankisutsa / twigaLinks
A tool that enumerates Android devices for information useful in understanding its internals and for exploit development. It supports android 4.2 to android 7.1.1
☆53Updated 7 years ago
Alternatives and similar repositories for twiga
Users that are interested in twiga are comparing it to the libraries listed below
Sorting:
- Network based protocol fuzzer☆73Updated 3 years ago
- ☆20Updated 9 years ago
- a radare2 plugin that decodes packets with Scapy☆33Updated 7 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆39Updated 9 years ago
- A shellcode testing harness.☆69Updated last year
- A modular pentesting framework implemented in C☆14Updated 6 years ago
- An automated Python + Ruby based XXE Exploiter (GUI + CLI)☆19Updated 9 years ago
- Framework for static and dynamic analysis in Android APKs☆32Updated 8 years ago
- Collection of Android security related resources☆103Updated last year
- Generic Command Exploitation Engine for exploiting web application command-injection bugs,.☆31Updated 12 years ago
- Provide a sort of shell-ish interface to make file directory traversal quicker and easier.☆24Updated 8 years ago
- Break Apps with Frida workshop material☆45Updated 7 years ago
- Telegram Bot to manage botnets created with struts vulnerability(CVE-2017-5638)☆43Updated 3 years ago
- Vulnerable Node.js Web Application to pratice with your pentesting skills☆21Updated 8 years ago
- PAVELOW Exploit Toolbox is a BASH script that corresponds with your KALI distro to better help your vulnerability hunting and exploiting …☆87Updated 7 years ago
- UPnP hacking scripts and tools☆76Updated 8 years ago
- a collection of payloads for common webapps☆73Updated 12 years ago
- cisco-global-exploiter : This tool detects 14 different vulnerabilities on Cisco routers and switches☆44Updated 6 years ago
- A tool to help you manage your leaks☆34Updated 7 years ago
- Bruteforce commandline buffer overflows and automated exploit generation, linux, aggressive arguments☆34Updated 3 years ago
- Post-exploitation scripts for OS X persistence and privesc☆72Updated 8 years ago
- Metasploit Usage Wiki☆47Updated 10 years ago
- Metasploit Framework with Viproy installed.☆36Updated 8 years ago
- Tools for MITMing Yahoo! Mail with a Wifi Pineapple Mark V and Flash☆28Updated 8 years ago
- Faraday Workspaces for Bug Bounties☆21Updated 9 years ago
- Materials related to the 2017 BSides Las Vegas presentation☆52Updated 4 years ago
- WhiteBox CMS analysis☆69Updated 2 years ago
- Exploits for getting local root on Linux, BSD, AIX, HP-UX, Solaris, RHEL, SUSE etc.☆46Updated 10 years ago
- A collection of publicly released whitepapers☆49Updated 7 years ago
- Example ASM code following SLAE course and exam assignments.☆36Updated 8 years ago