hahwul / Mobilehackersweapons
Licence: mit
Mobile Hacker's Weapons / A collection of cool tools used by Mobile hackers. Happy hacking , Happy bug-hunting
Stars: ✭ 170
Programming Languages
go
31211 projects - #10 most used programming language
Projects that are alternatives of or similar to Mobilehackersweapons
Webhackersweapons
⚔️ Web Hacker's Weapons / A collection of cool tools used by Web hackers. Happy hacking , Happy bug-hunting
Stars: ✭ 1,205 (+608.82%)
Mutual labels: hacking, scanner, tools, bugbounty
Dumpall
一款信息泄漏利用工具,适用于.git/.svn源代码泄漏和.DS_Store泄漏
Stars: ✭ 250 (+47.06%)
Mutual labels: hacking, scanner, tools
Hacking
hacker, ready for more of our story ! 🚀
Stars: ✭ 413 (+142.94%)
Mutual labels: hacking, scanner, tools
Appinfoscanner
一款适用于以HW行动/红队/渗透测试团队为场景的移动端(Android、iOS、WEB、H5、静态网站)信息收集扫描工具,可以帮助渗透测试工程师、攻击队成员、红队成员快速收集到移动端或者静态WEB站点中关键的资产信息并提供基本的信息输出,如:Title、Domain、CDN、指纹信息、状态信息等。
Stars: ✭ 424 (+149.41%)
Mutual labels: hacking, scanner, tools
Ladon
大型内网渗透扫描器&Cobalt Strike,Ladon8.9内置120个模块,包含信息收集/存活主机/端口扫描/服务识别/密码爆破/漏洞检测/漏洞利用。漏洞检测含MS17010/SMBGhost/Weblogic/ActiveMQ/Tomcat/Struts2,密码口令爆破(Mysql/Oracle/MSSQL)/FTP/SSH(Linux)/VNC/Windows(IPC/WMI/SMB/Netbios/LDAP/SmbHash/WmiHash/Winrm),远程执行命令(smbexec/wmiexe/psexec/atexec/sshexec/webshell),降权提权Runas、GetSystem,Poc/Exploit,支持Cobalt Strike 3.X-4.0
Stars: ✭ 2,911 (+1612.35%)
Mutual labels: hacking, scanner, tools
Vhostscan
A virtual host scanner that performs reverse lookups, can be used with pivot tools, detect catch-all scenarios, work around wildcards, aliases and dynamic default pages.
Stars: ✭ 767 (+351.18%)
Mutual labels: hacking, scanner, bugbounty
Nosqlmap
Automated NoSQL database enumeration and web application exploitation tool.
Stars: ✭ 1,928 (+1034.12%)
Mutual labels: hacking, scanner, bugbounty
Security Tools
Collection of small security tools, mostly in Bash and Python. CTFs, Bug Bounty and other stuff.
Stars: ✭ 509 (+199.41%)
Mutual labels: hacking, scanner, bugbounty
Xspear
Powerfull XSS Scanning and Parameter analysis tool&gem
Stars: ✭ 583 (+242.94%)
Mutual labels: hacking, scanner, bugbounty
Reconftw
reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and finding out vulnerabilities
Stars: ✭ 974 (+472.94%)
Mutual labels: hacking, scanner, bugbounty
Jaeles
The Swiss Army knife for automated Web Application Testing
Stars: ✭ 1,073 (+531.18%)
Mutual labels: hacking, scanner, bugbounty
Gofingerprint
GoFingerprint is a Go tool for taking a list of target web servers and matching their HTTP responses against a user defined list of fingerprints.
Stars: ✭ 120 (-29.41%)
Mutual labels: hacking, bugbounty
Bbrecon
Python library and CLI for the Bug Bounty Recon API
Stars: ✭ 169 (-0.59%)
Mutual labels: hacking, bugbounty
Awesome Mobile Security
An effort to build a single place for all useful android and iOS security related stuff. All references and tools belong to their respective owners. I'm just maintaining it.
Stars: ✭ 1,837 (+980.59%)
Mutual labels: hacking, bugbounty
Corsme
Cross Origin Resource Sharing MisConfiguration Scanner
Stars: ✭ 118 (-30.59%)
Mutual labels: scanner, bugbounty
Pidrila
Python Interactive Deepweb-oriented Rapid Intelligent Link Analyzer
Stars: ✭ 125 (-26.47%)
Mutual labels: hacking, scanner
Asnlookup
Leverage ASN to look up IP addresses (IPv4 & IPv6) owned by a specific organization for reconnaissance purposes, then run port scanning on it.
Stars: ✭ 163 (-4.12%)
Mutual labels: hacking, bugbounty
Reconnoitre
A security tool for multithreaded information gathering and service enumeration whilst building directory structures to store results, along with writing out recommendations for further testing.
Stars: ✭ 1,824 (+972.94%)
Mutual labels: hacking, scanner
Family project
Table of Contents
Weapons
OS | Type | Name | Description | Popularity | Language |
---|---|---|---|---|---|
All | Analysis | RMS-Runtime-Mobile-Security | Runtime Mobile Security (RMS) 📱🔥 - is a powerful web interface that helps you to manipulate Android and iOS Apps at Runtime | ||
All | Analysis | scrounger | Mobile application testing toolkit | ||
All | Proxy | BurpSuite | The BurpSuite | ||
All | Proxy | hetty | Hetty is an HTTP toolkit for security research. | ||
All | Proxy | httptoolkit | HTTP Toolkit is a beautiful & open-source tool for debugging, testing and building with HTTP(S) on Windows, Linux & Mac | ||
All | Proxy | proxify | Swiss Army knife Proxy tool for HTTP/HTTPS traffic capture, manipulation, and replay on the go. | ||
All | Proxy | zaproxy | The OWASP ZAP core project | ||
All | RE | frida | Clone this repo to build Frida | ||
All | RE | frida-tools | Frida CLI tools | ||
All | RE | fridump | A universal memory dumper using Frida | ||
All | RE | ghidra | Ghidra is a software reverse engineering (SRE) framework | ||
All | SCRIPTS | frida-scripts | A collection of my Frida.re instrumentation scripts to facilitate reverse engineering of mobile apps. | ||
All | Scanner | Mobile-Security-Framework-MobSF | Mobile Security Framework (MobSF) is an automated, all-in-one mobile application (Android/iOS/Windows) pen-testing, malware analysis and security assessment framework capable of performing static and dynamic analysis. | ||
All | Scanner | StaCoAn | StaCoAn is a crossplatform tool which aids developers, bugbounty hunters and ethical hackers performing static code analysis on mobile applications. | ||
Android | Analysis | apkleaks | Scanning APK file for URIs, endpoints & secrets. | ||
Android | Analysis | drozer | The Leading Security Assessment Framework for Android. | ||
Android | NFC | nfcgate | An NFC research toolkit application for Android | ||
Android | Pentest | Kali NetHunter | Mobile Penetration Testing Platform | ||
Android | RE | Apktool | A tool for reverse engineering Android apk files | ||
Android | RE | Smali-CFGs | Smali Control Flow Graph's | ||
Android | RE | apkx | One-Step APK Decompilation With Multiple Backends | ||
Android | RE | bytecode-viewer | A Java 8+ Jar & Android APK Reverse Engineering Suite (Decompiler, Editor, Debugger & More) | ||
Android | RE | dex-oracle | A pattern based Dalvik deobfuscator which uses limited execution to improve semantic analysis | ||
Android | RE | dex2jar | Tools to work with android .dex and java .class files | ||
Android | RE | enjarify | Enjarify is a tool for translating Dalvik bytecode to equivalent Java bytecode. This allows Java analysis tools to analyze Android applications. | ||
Android | RE | jadx | Dex to Java decompiler | ||
Android | RE | jd-gui | A standalone Java Decompiler GUI | ||
Android | RE | procyon | Procyon is a suite of Java metaprogramming tools, including a rich reflection API, a LINQ-inspired expression tree API for runtime code generation, and a Java decompiler. | ||
Android | Scanner | qark | Tool to look for several security related Android application vulnerabilities | ||
iOS | Analysis | iFunBox | General file management software for iPhone and other Apple products | ||
iOS | Analysis | idb | idb is a tool to simplify some common tasks for iOS pentesting and research | ||
iOS | Analysis | needle | The iOS Security Testing Framework | ||
iOS | Analysis | objection | 📱 objection - runtime mobile exploration | ||
iOS | Bluetooth | toothpicker | ToothPicker is an in-process, coverage-guided fuzzer for iOS. for iOS Bluetooth | ||
iOS | Inject | bfinject | Dylib injection for iOS 11.0 - 11.1.2 with LiberiOS and Electra jailbreaks | ||
iOS | RE | Clutch | Fast iOS executable dumper | ||
iOS | RE | class-dump | Generate Objective-C headers from Mach-O files. | ||
iOS | RE | frida-ios-dump | pull decrypted ipa from jailbreak device | ||
iOS | RE | iRET | iOS Reverse Engineering Toolkit. | ||
iOS | RE | momdec | Core Data Managed Object Model Decompiler | ||
iOS | Unpinning | MEDUZA | A more or less universal SSL unpinning tool for iOS | ||
iOS | Unpinning | ssl-kill-switch2 | Blackbox tool to disable SSL certificate validation - including certificate pinning - within iOS and OS X Apps |
Thanks to (Contributor)
I would like to thank everyone who helped with this project 👍😎
Note that the project description data, including the texts, logos, images, and/or trademarks,
for each open source project belongs to its rightful owner.
If you wish to add or remove any projects, please contact us at [email protected].