A collection of cool tools used by Mobile hackers. Happy hacking , Happy bug-hunting.
The clandestine tools and techniques of mobile hackers are laid bare. In this curated collection, delve into the arsenal utilized by modern-day hackers in their quest for digital exploration and exploitation.
From runtime manipulation to code disassembly, uncover the inner workings of mobile hacking and embark on a journey through the clandestine world of cyber warfare.
| OS | Type | Name | Description | Popularity | Language |
|---|---|---|---|---|---|
| All | Analysis | RMS-Runtime-Mobile-Security | Runtime Mobile Security (RMS) ???????? – is a powerful web interface that helps you to manipulate Android and iOS Apps at Runtime | ||
| All | Analysis | flipper | A desktop debugging platform for mobile developers. | ||
| All | Analysis | scrounger | Mobile application testing toolkit | ||
| All | Pentest | metasploit-framework | Metasploit Framework | ||
| All | Proxy | BurpSuite | The BurpSuite | ||
| All | Proxy | hetty | Hetty is an HTTP toolkit for security research. | ||
| All | Proxy | httptoolkit | HTTP Toolkit is a beautiful & open-source tool for debugging, testing and building with HTTP(S) on Windows, Linux & Mac |
For more information click here.
Introduction In today’s cyber threat landscape, protecting endpoints such as computers, smartphones, and tablets from…
Introduction In today's fast-paced cybersecurity landscape, incident response is critical to protecting businesses from cyberattacks.…
Artificial Intelligence (AI) is changing how industries operate, automating processes, and driving new innovations. However,…
Image credit:pexels.com If you think back to the early days of personal computing, you probably…
In an era defined by technological innovation, the way people handle and understand money has…
The online world becomes more visually driven with every passing year. Images spread across websites,…