[go: up one dir, main page]

Showing 35 open source projects for "mobile penetration"

View related business solutions
  • Professional Email Hosting for Small Business | Greatmail Icon
    Professional Email Hosting for Small Business | Greatmail

    Ready to switch to a more reliable and secure email hosting solution?

    Dependable cloud based email hosting with spam filtering, antivirus protection, generous storage and webmail. Compatible with Outlook and all other POP3/IMAP clients. High volume SMTP service for responsible senders. Outbound relay service for transactional messages, email marketing campaigns, newsletters and other applications. Dedicated email servers, clustering and multiple IP load balancing for high volume senders. Fixed monthly cost with unlimited sending and reputation monitoring. Greatmail is an email service provider (ESP) specializing in business class email hosting, SMTP hosting and email servers. For ISPs, application programmers and cloud developers, we also provide custom solutions including dedicated IP servers and process specific, load balanced configurations with multiple servers.
    Learn More
  • Endpoint Protection Software for Businesses | HYPERSECURE Icon
    Endpoint Protection Software for Businesses | HYPERSECURE

    DriveLock protects systems, data, end devices from data loss and misuse.

    The HYPERSECURE endpoint protection platform is a comprehensive suite of products and services enhanced by European third-party solutions. It ensures our customers’ IT security, regulatory compliance, and digital sovereignty.
    Learn More
  • 1
    Proxyman

    Proxyman

    Web Debugging Proxy for macOS, iOS, and Android

    Don't let cumbersome web debugging tools hold you back. With Proxyman's native macOS app, you can capture, inspect, and manipulate HTTP(s) traffic with ease. Intuitive, thoughtful, built with meticulous attention to detail. Comprehensive Guideline to set up with iOS simulator and iOS and Android devices. Proxyman acts as a man-in-the-middle server that capture the traffic between your applications and SSL Web Server. With built-in macOS setup, so you can inspect your HTTP/HTTPS Request and...
    Downloads: 17 This Week
    Last Update:
    See Project
  • 2
    Brook

    Brook

    Brook is a cross-platform strong encryption and not detectable proxy

    Brook is a cross-platform strong encryption and not detectable proxy. Brook's goal is to keep it simple, stupid and not detectable. You can run commands after entering the command-line interface. Usually, everyone uses the command line interface on Linux servers. Of course, Linux also has desktops that can also run GUI. Of course, macOS and Windows also have command-line interfaces, but you may not use them frequently. Usually, the applications opened by double-clicking/clicking on...
    Downloads: 27 This Week
    Last Update:
    See Project
  • 3
    apk-mitm

    apk-mitm

    Application that automatically prepares Android APK files for HTTPS

    Inspecting a mobile app's HTTPS traffic using a proxy is probably the easiest way to figure out how it works. However, with the Network Security Configuration introduced in Android 7 and app developers trying to prevent MITM attacks using certificate pinning, getting an app to work with an HTTPS proxy has become quite tedious.
    Downloads: 21 This Week
    Last Update:
    See Project
  • 4
    BeEF

    BeEF

    The browser exploitation framework project

    BeEF is short for The Browser Exploitation Framework. It is a penetration testing tool that focuses on the web browser. Amid growing concerns about web-borne attacks against clients, including mobile clients, BeEF allows the professional penetration tester to assess the actual security posture of a target environment by using client-side attack vectors. Unlike other security frameworks, BeEF looks past the hardened network perimeter and client system, and examines exploitability within the context of the one open door: the web browser. ...
    Downloads: 1 This Week
    Last Update:
    See Project
  • Planview is the leading end-to-end platform for Strategic Portfolio Management (SPM) and Digital Product Development (DPD) Icon
    Planview is the leading end-to-end platform for Strategic Portfolio Management (SPM) and Digital Product Development (DPD)

    Manage project and product portfolios enterprise-wide

    Planview AdaptiveWork (formerly Clarizen) with embedded AI helps you proactively plan and deliver any type and size of portfolio, project, and work. Gain AI-enhanced visibility and insights, drive collaboration, and achieve better business outcomes across your organization.
    Learn More
  • 5
    thc-hydra

    thc-hydra

    Shows how easy it would be to gain unauthorized access to a system

    Number one of the biggest security holes are passwords, as every password security study shows. This tool is a proof of concept code, to give researchers and security consultants the possibility to show how easy it would be to gain unauthorized access from remote to a system. There are already several login hacker tools available, however, none does either support more than one protocol to attack or support parallelized connects. It was tested to compile cleanly on Linux, Windows/Cygwin,...
    Downloads: 78 This Week
    Last Update:
    See Project
  • 6
    Cake

    Cake

    Distributed LLM and StableDiffusion inference

    Cake is a compact, powerful toolkit that combines a flexible TCP/UDP proxy, port forwarding system, and connection manager designed for both development and penetration testing scenarios. It enables users to create complex networking flows where traffic can be proxied, relayed, and manipulated between endpoints — useful for debugging networked applications, inspecting protocols, or tunneling traffic through different hops. The tool is designed to work with multiple protocols and supports...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Address_Decode

    Address_Decode

    Decode various cryptocurrency addresses

    Address to hash160 is an efficient multi-threaded tool designed to decode various cryptocurrency addresses (such as Bitcoin BTC,Bitcoin Cash BCH, Litecoin LTC, Bitcoin Gold BTG, etc.) to extract hash160 values. It is often used in research such as brainflayer, keyhunt, BitCrack, ecloop, keyhunt cuda, etc.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 8
     Hack TikTok Account with AI

    Hack TikTok Account with AI

    AI-driven TikTok account security hacking

    Hack TikTok Password - AI-Powered Tool This application was made using the API of PASS REVELATOR, for more information about Snapchat hacking account and security, please visit their website: https://www.passwordrevelator.net/en/passunlocker Account Security Analyzer for TikTok A comprehensive testing environment that uses advanced computational techniques to evaluate password resilience. The system simulates credential testing scenarios to identify potential vulnerabilities, helping...
    Downloads: 3 This Week
    Last Update:
    See Project
  • 9
     Hack Snapchat Account with AI

    Hack Snapchat Account with AI

    AI-driven Snapchat account security hacking

    Hack Snapchat Password - AI-Powered Tool This application was made using the API of PASS REVELATOR, for more information about Snapchat hacking account and security, please visit their website: https://www.passwordrevelator.net/en/passdecoder Advanced Security Assessment Platform for Instagram A machine learning-based system designed to hack and demonstrate password vulnerability through controlled, authorized simulations. It employs sophisticated pattern analysis to audit security...
    Downloads: 3 This Week
    Last Update:
    See Project
  • EasySend is a no-code platform that transforms customer journeys Icon
    EasySend is a no-code platform that transforms customer journeys

    Defy form limits. 
Create digital experiences.

    Evolve forms into smart, AI-powered digital workflows that streamline your data intake and elevate customer experiences.
    Learn More
  • 10
    Hack X Password With AI

    Hack X Password With AI

    AI-driven X account security hacking

    Hack X Account - AI-Powered Tool This application was made using the API of PASS REVELATOR, for more information about X hacking account and security, please visit their website: https://www.passwordrevelator.net/en/passrecovery Advanced Security Assessment Platform for X An AI-driven research system that hack authorized password vulnerability testing to expose weaknesses—never for unauthorized access. Built to strengthen defenses through ethical, controlled analysis. Key...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    Hack-Facebook-Account-with-AI

    Hack-Facebook-Account-with-AI

    AI-driven Facebook account security hacking

    Advanced Account Security Hacker for Facebook A machine learning–powered platform designed to ethically evaluate the resilience of Facebook account credentials through authorized, simulated intrusion attempts. By modeling real-world attacker behavior, it identifies weak passwords and potential exposure risks without compromising user privacy. Core Capabilities: • Adaptive Credential Modeling – Generates likely password candidates using behavioral prediction algorithms, not static...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
     Hack-Yahoo-Account-with-AI

    Hack-Yahoo-Account-with-AI

    AI-driven Yahoo account security hacking

    Hack Yahoo Password - AI-Powered Tool This application was made using the API of PASS REVELATOR, for more information about Yahoo hacking account and security, please visit their website: https://www.passwordrevelator.net/en/passaccess Advanced Security Hacking Platform for Yahoo Accounts A machine learning–powered system engineered to ethically evaluate password resilience through authorized, simulated intrusion attempts. It identifies potential weaknesses by analyzing behavioral...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    Hack Outlook Account with AI

    Hack Outlook Account with AI

    AI-driven Outlook account security hacking

    Hack Outlook Password - AI-Powered Tool This application was made using the API of PASS REVELATOR, for more information about Outlook hacking account and security, please visit their website: https://www.passwordrevelator.net/en/passrevelator Intelligent Security Evaluation Platform for Outlook A machine learning–driven system built to ethically hack and expose password weaknesses through authorized, controlled testing. It leverages advanced behavioral pattern recognition to evaluate...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    pH7 Social Dating CMS (pH7Builder)❤️

    pH7 Social Dating CMS (pH7Builder)❤️

    🚀 Professional Social Dating Web App Builder (formerly pH7CMS)

    pH7Builder is a Professional, Free & Open Source PHP Social Dating Builder Software (primarily designed for developers ...). This Social Dating Web App is fully coded in object-oriented PHP (OOP) with the MVC pattern (Model-View-Controller). It is low resource-intensive, extremely powerful and highly secure. pH7Builder is included with over 42 native modules and is based on its homemade pH7 Framework which includes more than 52 packages To summarize, pH7Builder Social Dating Script...
    Downloads: 48 This Week
    Last Update:
    See Project
  • 15
    NbuExplorer
    Nokia NBU, NBF, NFB, NFC and ARC backup file parser, extractor and viewer. It can help you to check content of backup or extract files from it. Requires MS .Net Framework 2
    Leader badge">
    Downloads: 144 This Week
    Last Update:
    See Project
  • 16
    Droid Pentest

    Droid Pentest

    Droid Pentest New version help you to find all android apps for penetr

    Droid Pentest New version help you to find all android apps for penetration testing and hacking so you can make complete penetration test platform for Ethical hackers, IT administrator and Cyber security professional to perform different tasks like reconnaissance, scanning performing exploits etc with More then 60 Plus App.
    Downloads: 21 This Week
    Last Update:
    See Project
  • 17
    DownloadBot

    DownloadBot

    A distributed cross-platform Telegram Bot

    A distributed cross-platform Telegram Bot that can control your Aria2 server, control server files and also upload to OneDrive / Google Drive. This project is mainly to use a small hard disk server for offline downloading, for large BitTorrent files to be downloaded in sections according to the size of the hard disk, each time downloading a part, then uploading the network disk, deleting and then downloading the other parts, until all the files are downloaded. At the same time, communication...
    Downloads: 4 This Week
    Last Update:
    See Project
  • 18
    Tamper Dev

    Tamper Dev

    Extension that allows you to intercept and edit HTTP/HTTPS requests

    If you are a developer, you can use Tamper Dev to debug your websites, or if you are a pentester, you can use it to search for security vulnerabilities by inspecting the HTTP traffic from your browser. Unlike most other extensions, Tamper Dev allows you to intercept, inspect and modify the requests before they are sent to the server. This extension provides functionality similar to Burp Proxy, MITM Proxy, OWASP ZAP, Tamper Data, and Postman Proxy, but without the need of additional software,...
    Downloads: 44 This Week
    Last Update:
    See Project
  • 19
    Zynix-Fusion

    Zynix-Fusion

    zynix-Fusion is a framework for hacking

    zynix-Fusion is a framework that aims to centralize, standardizeand simplify the use of various security tools for pentest professionals.zynix-Fusion (old name: Linux evil toolkit) has few simple commands, one of which is theinit function that allows you to define a target, and thus use all the toolswithout typing anything else.
    Downloads: 6 This Week
    Last Update:
    See Project
  • 20
    ANDRAX Hacker's Platform

    ANDRAX Hacker's Platform

    Advanced Ethical Hacking and Penetration Testing Platform

    The most complete and Advanced Penetration Testing and Ethical Hacking Platform dedicated to Advanced Professionals. Developed to bring the power of Offensive Security in the anyone's pocket 100% OPEN SOURCE - ANDRAX is a independent solution for Security professionals who loves Linux
    Leader badge">
    Downloads: 48 This Week
    Last Update:
    See Project
  • 21
    SSL Kill Switch 2

    SSL Kill Switch 2

    Blackbox tool to disable SSL certificate validation

    Blackbox tool to disable SSL/TLS certificate validation - including certificate pinning - within iOS and macOS applications. Once loaded into an iOS or macOS application, SSL Kill Switch 2 will patch low-level functions responsible for handling SSL/TLS connections in order to override and disable the system's default certificate validation, as well as any kind of custom certificate validation (such as certificate pinning). It was successfully tested against various applications implementing...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 22
    Cyborg Essentials

    Cyborg Essentials

    Cyborg Essenitals is Debian based Penetration Testing Distro

    Cyborg Essenitals is all new series Debian based Penetration Testing Distro , a product of Cyborg Linux and cousin of Cyborg Hawk Linux . It is different from cyborg hawk as it is based on DEBIAN. It contains all the essentials tools a pro ethical hacker and security expert needs which makes it lightweight and half the size of Cyborg Hawk Linux. Its real strength comes from the understanding that a tester requires a strong and efficient system,that benefits from a strong selection of...
    Leader badge">
    Downloads: 6 This Week
    Last Update:
    See Project
  • 23
    OWASP Security Shepherd

    OWASP Security Shepherd

    Web and mobile application security awareness/training platform

    The OWASP Security Shepherd project enables users to learn or to improve upon existing manual penetration testing skills. Utilizing the OWASP top ten as a challenge test bed, common security vulnerabilities can be explored and their impact on a system understood. The by-product of this challenge game is the acquired skill to harden a player's own environment from OWASP top ten security risks. The modules have been crafted to provide not only a challenge for a security novice, but security...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24

    cSploit

    cSploit - An Android network penetration suite.

    cSploit is an Android network analysis and penetration suite which aims to offer to IT security experts/geeks the most complete and advanced professional toolkit to perform network security assesments on a mobile device.Once cSploit is started, you will be able to easily map your network, fingerprint alive hosts operating systems and running services, search for known vulnerabilities, crack logon procedures of many tcp protocols, perform man in the middle attacks such as password sniffing ( with common protocols dissection ), real time traffic manipulation, etc, etc .
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    cyborghawk v1.1

    cyborghawk v1.1

    Latest-v1.1 of The World's most advanced pen testing distribution ever

    updated version of The most advanced, powerful and yet beautiful penetration testing distribution ever created.Lined up with ultimate collection of tools for pro Ethical Hackers and Cyber Security Experts. Simplify security in your IT infrastructure with Cyborg. Its real strength comes from the understanding that a tester requires a strong and efficient system,that benefits from a strong selection of tools, integrated with a stable linux environment.
    Downloads: 85 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • Next