A collection of cool tools used by Mobile hackers. Happy hacking , Happy bug-hunting.
The clandestine tools and techniques of mobile hackers are laid bare. In this curated collection, delve into the arsenal utilized by modern-day hackers in their quest for digital exploration and exploitation.
From runtime manipulation to code disassembly, uncover the inner workings of mobile hacking and embark on a journey through the clandestine world of cyber warfare.
OS | Type | Name | Description | Popularity | Language |
---|---|---|---|---|---|
All | Analysis | RMS-Runtime-Mobile-Security | Runtime Mobile Security (RMS) ???????? – is a powerful web interface that helps you to manipulate Android and iOS Apps at Runtime | ||
All | Analysis | flipper | A desktop debugging platform for mobile developers. | ||
All | Analysis | scrounger | Mobile application testing toolkit | ||
All | Pentest | metasploit-framework | Metasploit Framework | ||
All | Proxy | BurpSuite | The BurpSuite | ||
All | Proxy | hetty | Hetty is an HTTP toolkit for security research. | ||
All | Proxy | httptoolkit | HTTP Toolkit is a beautiful & open-source tool for debugging, testing and building with HTTP(S) on Windows, Linux & Mac |
For more information click here.
bomber is an application that scans SBOMs for security vulnerabilities. So you've asked a vendor…
Embed a payload within a PNG file by splitting the payload across multiple IDAT sections.…
Exploit-Street, where we dive into the ever-evolving world of cybersecurity with a focus on Local…
Shadow Dumper is a powerful tool used to dump LSASS (Local Security Authority Subsystem Service)…
shadow-rs is a Windows kernel rootkit written in Rust, demonstrating advanced techniques for kernel manipulation…
Extract and execute a PE embedded within a PNG file using an LNK file. The…