ynsmroztas / AndroidNativeScannerLinks
Analyze Android native `.so` files
☆119Updated 6 months ago
Alternatives and similar repositories for AndroidNativeScanner
Users that are interested in AndroidNativeScanner are comparing it to the libraries listed below
Sorting:
- SubOwner - A Simple tool check for subdomain takeovers.☆116Updated last year
- ☆96Updated 10 months ago
- ☆169Updated last month
- 📲 Apepe is a project developed to help to capture informations from a Android app through his APK file. It can be used to extract the co…☆141Updated 3 months ago
- A New Approach to Directory Bruteforce with WaybackLister v1.0☆225Updated 5 months ago
- As a bug hunter, are your bug bounty reports getting rejected because you don't use a "malicious" Proof of Concept (PoC) app to exploit t…☆129Updated last month
- This script automates SQL injection testing using SQLMap with AI-powered decision making.☆29Updated 7 months ago
- SubCerts is a simple tool that uses certificate transparency logs (via crt.sh) to extract subdomains of a given domain.☆75Updated last month
- SAST and DAST Scan Supported with 400 plus rules available for secrets and allow you add your own wordlist as well. lightweight source c…☆108Updated 5 months ago
- Search for all leaked keys/secrets using one regex! bugbounty☆183Updated 10 months ago
- A tool for inspecting and analyzing mobile application storage files.☆49Updated 8 months ago
- Rust-powered HTTP Request Smuggling Scanner.☆99Updated this week
- Resources for Mobile Application Testing 📓☆74Updated last year
- IDOR Scanner is a Burp Suite extension that automates the detection and enumeration of potentially vulnerable numeric fields to identify …☆43Updated 11 months ago
- GarudRecon automates domain recon with top open-source tools to discover assets, enumerate subdomains, and detect XSS, SQLi, LFI, RCE & m…☆191Updated 2 weeks ago
- IDOR Forge is an advanced and versatile tool designed to detect Insecure Direct Object Reference (IDOR) vulnerabilities in web applicatio…☆218Updated 4 months ago
- Frogy 2.0 is an automated external reconnaissance and Attack Surface Management (ASM) toolkit☆331Updated 3 months ago
- Advanced CORS Header Checker Tool with Vulnerability Detection and Bypass Attempts☆66Updated 8 months ago
- ☆196Updated this week
- Unwaf is a Go tool designed to help identify WAF bypasses using passive techniques, such as: SPF records and DNS history. By default, Unw…☆98Updated 7 months ago
- Dnsbruter is a powerful tool designed to perform active subdomain enumeration and discovery. It uses DNS resolution to efficiently brutef…☆124Updated last year
- Zzl is a reconnaissance tool that collects subdomains from SSL certificates in IP ranges☆44Updated last year
- A passive way to find backups/ sensitive information.☆87Updated 6 months ago
- ADKAVEH - One PowerShell script for Active Directory discovery and safe attack simulation.☆37Updated 4 months ago
- Physical penetration testing is a critical aspect of security assessment that involves simulating real-world attacks to evaluate the effe…☆86Updated 2 weeks ago
- Bypass-Four03 is a powerful bash tool designed to help testers bypass HTTP 403 forbidden errors through various path and header manipulat…☆163Updated 8 months ago
- I-Espresso is a tool that enables users to generate Portable Executable (PE) files from batch scripts. Leveraging IExpress, it demonstrat…☆85Updated last year
- 🪄 XSSDynaGen is a tool designed to analyze URLs with parameters, identify the characters allowed by the server, and generate advanced XS…☆55Updated last year
- ☆27Updated last year
- ☆23Updated 10 months ago