Analyze Android native `.so` files
☆122Jul 28, 2025Updated 8 months ago
Alternatives and similar repositories for AndroidNativeScanner
Users that are interested in AndroidNativeScanner are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Multi-target unauthenticated RCE scanner for CVE-2025-34085 affecting WordPress Simple File List plugin. Uploads, renames, and triggers P…☆34Jul 13, 2025Updated 8 months ago
- A curated list of awesome ATM hacking resources.☆21Dec 4, 2025Updated 4 months ago
- 𝘔𝘢𝘯𝘺 𝘰𝘧 𝘵𝘩𝘦𝘴𝘦 𝘴𝘤𝘳𝘪𝘱𝘵𝘴 𝘢𝘳𝘦 𝘤𝘰𝘭𝘭𝘦𝘤𝘵𝘦𝘥 𝘧𝘳𝘰𝘮 𝘤𝘰𝘶𝘳𝘴𝘦𝘴, 𝘣𝘭𝘰𝘨𝘴, 𝘤𝘰𝘮𝘮𝘶𝘯𝘪𝘵𝘺 𝘳𝘦𝘴𝘰𝘶𝘳𝘤�…☆28Nov 30, 2025Updated 4 months ago
- ☆20Updated this week
- check if the source code compressed and uploaded to the server by mistake☆10Feb 21, 2022Updated 4 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- ☆177Mar 16, 2026Updated 3 weeks ago
- DeepSeek Pentest AI - Burp Suite extension☆58Sep 14, 2025Updated 6 months ago
- CVE-2025-55182-bypass-waf☆31Jan 8, 2026Updated 3 months ago
- dnsprober is a fast and multipurpose DNS reconnaissance tool designed for efficient DNS probing and enumeration. It supports multiple DNS…☆36Jun 23, 2025Updated 9 months ago
- GarudRecon automates domain recon with top open-source tools to discover assets, enumerate subdomains, and detect XSS, SQLi, LFI, RCE & m…☆199Mar 28, 2026Updated 2 weeks ago
- ScanExp automates the scanning of any machine's open ports via the ip address and performs a brute force attack on ports 20, 21 for the F…☆26Oct 14, 2023Updated 2 years ago
- ☆12Feb 20, 2025Updated last year
- ☆18Sep 27, 2025Updated 6 months ago
- Automation with SSH for Hacking☆10Jan 28, 2025Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- this is a tool to detect the Web service is ok or not☆24Oct 14, 2020Updated 5 years ago
- Burp Suite extension designed to help security professionals search for custom sensitive information in HTTP responses☆11Apr 25, 2023Updated 2 years ago
- Tool for CVE-2022-1388☆14May 13, 2022Updated 3 years ago
- A powerful collection of tools designed for social engineering research, penetration testing, and security awareness training. These tool…☆60Jan 25, 2026Updated 2 months ago
- ☆15May 8, 2025Updated 11 months ago
- A fast WordPress plugin enumeration tool☆816Apr 1, 2026Updated last week
- Oracle Database Penetration Testing Reference (10g/11g)☆40Jul 28, 2018Updated 7 years ago
- High-speed Go email scraper that crawls sites and internal links concurrently to collect email addresses for reconnaissance, research, or…☆31Dec 18, 2025Updated 3 months ago
- ☆29Dec 13, 2023Updated 2 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- ☆109Feb 14, 2026Updated last month
- this repository made to help me All Dorking repositories find for one location☆36Aug 31, 2025Updated 7 months ago
- This extension replaces the default repeater tab name with the URL path of the repeater request.☆24Sep 3, 2021Updated 4 years ago
- This repo offers comprehensive information, necessary tools, and instructional videos for beginners in Android penetration testing, provi…☆23Jun 12, 2023Updated 2 years ago
- Get 10k subdomains in securitytrails using cookie without apikey.☆37Oct 23, 2025Updated 5 months ago
- ☆12Dec 29, 2023Updated 2 years ago
- Rust-powered HTTP Request Smuggling Scanner.☆117Updated this week
- ☆21Dec 15, 2020Updated 5 years ago
- Multi-threading Leaks/Intelligence file parser☆16Mar 16, 2026Updated 3 weeks ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Morgan is a powerful tool designed to help security researchers, developers, and security auditors identify sensitive information, vulner…☆56Feb 2, 2025Updated last year
- The fastest way to setup XSSHunter. It has options for the official and Discord/Slack Forks☆46Mar 2, 2024Updated 2 years ago
- Shared wordlists used for common subdomains , directory bruteforcing etc.☆10May 26, 2025Updated 10 months ago
- This repository contains a proof-of-concept exploit script for CVE-2025-32432, a pre-authentication Remote Code Execution (RCE) vulnerabi…☆24Apr 27, 2025Updated 11 months ago
- Build a Windows VM on VMWare ESXi, vCenter or vSphere from scratch 100% automated with Ansible.☆14Feb 10, 2025Updated last year
- A suite of cybersecurity applications used in Brazilian Army Cyber Security course to accelerate and automate processes. Some tools have …☆22Feb 23, 2025Updated last year
- Stay on the beat with SubHound - receive notifications for new subdomains on Telegram and Discord! 🐶🎵☆17Jun 4, 2023Updated 2 years ago