Red Squad
search
โŒ˜Ctrlk
BuyMeACoffee
Red Squad
  • ๐Ÿ /home/red-squad
  • ๐ŸŒWeb Hacking
    • ๐ŸšฉCTFs shortcuts
    • ๐Ÿ—บ๏ธAudits plan
    • ๐Ÿ•ต๏ธOSINT
    • calculatorEnumeration
    • ๐Ÿ”—HTTP Stuff
    • ๐Ÿ”Sessions / Tokens
    • ๐Ÿ’‰Injections
    • ๐ŸชฑWeb Vulnerabilities
    • โ›”WAF Bypass
    • โœ๏ธServers / CMS
    • ๐Ÿ–‡๏ธAPI
  • ๐ŸงLinux Hacking
    • ๐Ÿง—Privilege Escalation
    • ๐Ÿ‘ฃCover tracks
    • ๐ŸšชBackdoors
    • โญ•Reverse Shells
    • ๐Ÿ”ขCompiled Binaries
    • ๐ŸŒŠBuffer Overflow
    • ๐ŸณDocker Escape
    • ๐ŸคFile sharing
  • ๐ŸชŸWindows Hacking
    • ๐Ÿ‘ฅActive Directory
    • ๐Ÿ’กUseful AD Commands
    • ๐Ÿง—Privilege Escalation
    • ๐ŸšShells
    • ๐Ÿ”“Bypasses
    • ๐Ÿ“ƒOffice
    • ๐Ÿ‘ฉโ€๐Ÿ’ปSCCM | MECM
    • ๐Ÿ’ŽMicrosoft 365
  • ๐Ÿ’ฝSystems
    • ๐Ÿ•โ€๐ŸฆบServices Enumeration
    • ๐Ÿ–จ๏ธPrinters
    • ๐Ÿ›ก๏ธFortinet
    • ๐Ÿ“นCCTV / IP Cameras
  • ๐ŸŽ†Networks
    • ๐ŸŒช๏ธPivoting
    • ๐Ÿ”ฅFirewalls
    • ๐Ÿ”—Proxies
  • ๐Ÿ“ฑMobile Hacking
    • ๐Ÿค–Android
    • ๐ŸiOS
    • ๐Ÿ“บIOT
  • Configuration
    • ChromeOS
    • Mobile
      • Android
    • IBM
  • ๐Ÿ“กWireless Hacking
    • ๐ŸŽ†Wi-Fi Attacks
    • ๐ŸซBluetooth
  • ๐Ÿ‘จโ€๐Ÿ’ปCode Audit
    • โœ”๏ธBest Practices
    • โŒBad Practices
    • โš’๏ธTools
  • ๐Ÿ‘Thick Client Hacking
    • ๐Ÿ“Thick Client Pentesting Methodology
    • ๐Ÿ—„๏ธResources
  • ๐Ÿ—„๏ธMISC
    • ๐Ÿ”‘Default Credentials
    • ๐Ÿ”ปCVEs
    • ๐ŸฆŠBrowser Extensions
    • ๐Ÿค–AI
    • ๐Ÿ”ญHacking Labs
    • ๐Ÿ”ซExploitation Frameworks
  • ๐Ÿ•ต๏ธOPSEC
    • ๐Ÿ—๏ธPrivacy
  • ๐Ÿ”‘CRACKING | ENCODING
    • ๐ŸฅŠBruteforce tools
    • ๐Ÿ“Wordlists
    • ๐ŸงจCracking Tools
    • ๐Ÿ”ฌEncoding | Decoding Tools
    • ๐Ÿ”Steganography | Cipher
  • ๐Ÿ”ดRED TEAM
    • ๐Ÿ“ฅPassword Extract
    • ๐Ÿ•ต๏ธSpy cam
    • ๐Ÿ”’Lock Picking
    • ๐ŸŽฃPhishing
  • ๐ŸŒ€Whistle Blowing
    • ๐Ÿ“นCCTV
  • ๐Ÿ”ตBLUE TEAM
    • ๐ŸงฉForensics
    • ๐ŸฆนMalware Analysis
    • ๐Ÿ› ๏ธTools
    • ๐ŸฏHoneyPots
    • ๐ŸŽ†Networks Security
    • ๐Ÿช™Online IoC Scanners
  • ๐ŸžBug Bounty Related
    • Searching for CVEs
    • [FR] Legal
    • Dorks
  • ๐Ÿ–ฅ๏ธDEVELOPERS
    • ๐Ÿ‘จโ€๐Ÿ’ปIDE
  • ๐Ÿ“šLEARNING
    • Windows
    • SQL
    • SSL/TLS
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
githubEdit
  1. Configurationchevron-right
  2. Mobile

Android

hashtag
Tool

LogoGitHub - saladandonionrings/CIS-Android-Audit: Android Configuration Checker is a tool designed to ensure the compliance of Android device configuration settings with the CIS (Center for Internet Security) benchmarks. Leveraging ADB (Android Debug Bridge), the tool queries device settings and compares them against predefined CIS benchmarks, reporting any non-compliance.GitHubchevron-right
git clone https://github.com/saladandonionrings/CIS-Android-Audit.git
cd CIS-Android-Audit
pip install -r requirements.txt

# usage
python3 cis-audit-android.py --device $device_id

hashtag
Resources

https://downloads.cisecurity.org/downloads.cisecurity.orgchevron-right
PreviousMobilechevron-leftNextIBMchevron-right

Last updated 2 years ago

  • Tool
  • Resources