Security List Network™
Follow Us on FacebookFollow Us on Google+Follow Us on TwitterFollow Us on Pinterest
Menu
  • Home
  • About Us
  • Security Archives
  • Partners
Menu
  • Automation
  • Browser
  • Brute Force
  • Code Scripting
  • Cryptography
  • Encryption
  • Exploits
  • Framework
  • Linux Security Distros
  • Mobile Applications Tools
    • Android Tools
    • iPhone Tools
  • Networking
    • Bluetooth
    • Monitoring/System Administrator
    • Network Mapping/Scanner
    • Packet Sniffer/Sniffing
    • Internet Security
    • Spoofing/Spoofer
    • Wireless/wifi
  • Penetration Test
    • BenchMark
    • Cross Site Scripting(XSS)
    • Fuzzer/Fuzzing
    • Sql Injection
    • Stress Testing
  • Security Tools
    • Anti Malware/Virus – Malware Analysis
    • Firewall
    • Intrussion Detection and Prevention System(IDS/IPS)
    • Registry Analysis

SITEMAP

Archives

Browse: Home   /   Mobile Applications Tools
Whapa is an android whatsapp database parser that automates the process.

Whapa is an android whatsapp database parser that automates the process.

April 22, 2018
EL-Capitan
Android Tools, Code Scripting, Digital Forensics, Encryption

Whapa is an android whatsapp database parser that automates the process. The main purpose of whapa is to present the data handled by the Sqlite…

Read Article →
Access Brute Force - Android v7+ application to perform a dictionary bruteforce attack.

Access Brute Force – Android v7+ application to perform a dictionary bruteforce attack.

March 24, 2018
Infosec
Android Tools, Brute Force, Wireless/wifi

Access Brute Force : Android v7+ application to perform a dictionary brute force attack against a host exposing: + SMB Windows shares. + FTP server….

Read Article →
droidstatx - Android Applications Security Analyser, Xmind Generator.

droidstatx – Android Applications Security Analyser, Xmind Generator.

February 22, 2018
eldad
Android Tools, Code Scripting, Security Tools

+ droidstatx is a Python tool that generates an Xmind map with all the information gathered and any evidence of possible vulnerabilities identified via static…

Read Article →
droidcarve - Commandline Android reverse engineering tool.

droidcarve – Commandline Android reverse engineering tool.

February 20, 2018
Fragile
Android Tools, Security Tools

DroidCarve is capable of analyzing an Android APK file and automate certain reverse engineering tasks. Features: + Code disassembling into Smali bytecode. + APK signature…

Read Article →
androguard v3.1.0-rc1 - Reverse engineering, Malware and goodware analysis of Android applications.

androguard v3.1.0-rc1 – Reverse engineering, Malware and goodware analysis of Android applications.

February 16, 2018
Mr.Trojans
Android Tools, Security Tools

What has changed androguard v3.1.0-rc1? – Ported Androguard to python3! You can now use py2.7 or py>=3.3! – Tainted Analysis is gone and will be…

Read Article →
StaCoAn - an open source static code analyser for bugbounty hunters and ethical hackers.

StaCoAn – an open source static code analyser for bugbounty hunters and ethical hackers.

February 10, 2018
0x4D
Mobile Applications Tools, Security Tools

StaCoAn is a crossplatform tool which aids developers, bugbounty hunters and ethical hackers performing static code analysis on mobile applications. This tool will look for…

Read Article →
MADLIRA - Malware detection using learning and information retrieval for Android.

MADLIRA – Malware detection using learning and information retrieval for Android.

February 5, 2018
w0rm32
Android Tools, Anti Malware/Virus - Malware Analysis

MADLIRA is a tool for Android malware detection. It consists in two components: TFIDF component and SVM learning component. In gerneral, it takes an input…

Read Article →
sci - Reverse engineering framework working at the assembly (SMALI) level.

sci – Reverse engineering framework working at the assembly (SMALI) level.

January 11, 2018
cydec
Android Tools, Code Scripting, Framework, Penetration Test

Legal Disclamer: Usage of SCI for attacking targets without prior mutual consent is illegal. It is the end user’s responsibility to obey all applicable local,…

Read Article →
1 2 … 22 Next →

Copyright © 2022

Powered by Worldwide CyberSecurity Team.

  • Digital Forensics
  • Networking
  • Penetration Test
  • Security Tools