Highlights
Starred repositories
An OOB interaction gathering server and client library
AI-powered bug bounty hunting from your terminal - recon, 20 vuln classes, autonomous hunting, and report generation. All inside Claude Code.
Burp Suite extension that adds built-in MCP tooling, AI-assisted analysis, privacy controls, passive and active scanning and more
Financial data platform for analysts, quants and AI agents.
pSlip is an Android static analysis tool kit designed to find potentially vulnerable escalation paths by analyzing exported components, intent filters, provider permissions and cryptographic misuse.
Mobile Edge-Dynamic Unified Security Analysis
A feature-rich command-line audio/video downloader
pull decrypted ipa from jailbreak device
Filesystem monitor tool for Linux/Android iOS/macOS
Powerful android apk editor - aapt/aapt2 independent
An open-source AI agent that brings the power of Gemini directly into your terminal.
Flipper Zero HTTP Library for the WiFi Developer Board, BW16, Raspberry Pi, and other ESP32 devices
A reverse engineering tool for decompiling and disassembling the React Native Hermes bytecode
Empty project to quick start Proof of Concept app development
Cowrie SSH/Telnet Honeypot https://docs.cowrie.org/
Zero shot vulnerability discovery using LLMs
This app runs various webview tests to explore the attack surface and exploit techniques
Enchanted is iOS and macOS app for chatting with private self hosted language models such as Llama2, Mistral or Vicuna using Ollama.
User-friendly AI Interface (Supports Ollama, OpenAI API, ...)
Get up and running with Kimi-K2.5, GLM-5, MiniMax, DeepSeek, gpt-oss, Qwen, Gemma and other models.
A big list of Android Hackerone disclosed reports and other resources.
Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device.
Swift implementation of Tanner Helland's color-temperature-to-RGB algorithm.
OSX and iOS related security tools
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, se…