A collection of cool tools used by Mobile hackers. Happy hacking , Happy bug-hunting.
The clandestine tools and techniques of mobile hackers are laid bare. In this curated collection, delve into the arsenal utilized by modern-day hackers in their quest for digital exploration and exploitation.
From runtime manipulation to code disassembly, uncover the inner workings of mobile hacking and embark on a journey through the clandestine world of cyber warfare.
| OS | Type | Name | Description | Popularity | Language |
|---|---|---|---|---|---|
| All | Analysis | RMS-Runtime-Mobile-Security | Runtime Mobile Security (RMS) ???????? – is a powerful web interface that helps you to manipulate Android and iOS Apps at Runtime | ||
| All | Analysis | flipper | A desktop debugging platform for mobile developers. | ||
| All | Analysis | scrounger | Mobile application testing toolkit | ||
| All | Pentest | metasploit-framework | Metasploit Framework | ||
| All | Proxy | BurpSuite | The BurpSuite | ||
| All | Proxy | hetty | Hetty is an HTTP toolkit for security research. | ||
| All | Proxy | httptoolkit | HTTP Toolkit is a beautiful & open-source tool for debugging, testing and building with HTTP(S) on Windows, Linux & Mac |
For more information click here.
In MySQL Server 5.5 and earlier versions, the MyISAM was the default storage engine. So,…
A newly disclosed vulnerability in Microsoft Authenticator could expose one time sign in codes or…
Modrinth is a modern platform that’s rapidly changing the landscape of Minecraft modding, providing an…
A new, highly sophisticated malware campaign named BlackSanta has emerged, primarily targeting HR and recruitment…
Perplexity has unveiled an exciting new feature, Personal Computer, which allows AI agents to seamlessly…
In a recent cyber incident, a group named CARDINAL, associated with the label Russian Legion,…