A Metasploit payload that will connect to the victim and open up a permanent backdoor to their phone.
☆57Sep 4, 2016Updated 9 years ago
Alternatives and similar repositories for Metasploit-Android
Users that are interested in Metasploit-Android are comparing it to the libraries listed below
Sorting:
- BeEF Remote Control Metasploit Plugin - see README.beef☆13May 11, 2018Updated 7 years ago
- some tools for unpacking and repacking of boot.img and IFWI binaries on Intel Atom platform☆12May 20, 2015Updated 10 years ago
- FWRF is a open source tool for firmware web-side analysis.☆11Aug 27, 2015Updated 10 years ago
- ParrotSec armhf image builder.☆11Jul 26, 2017Updated 8 years ago
- EmPyre Web Interface☆12Mar 23, 2017Updated 8 years ago
- Remote Thread Injection by C# + Delegate Techniques☆12Jun 6, 2023Updated 2 years ago
- Exploit kit analyzer☆22Mar 3, 2015Updated 11 years ago
- Bootable Windows USB Stick with UEFI support☆15Dec 3, 2018Updated 7 years ago
- Attack Shell a.k.a. Ani-Shell is a simple PHP shell with some unique features like Mass Mailer, a simple Web-Server Fuzzer, Dosser, Back …☆15Jul 4, 2017Updated 8 years ago
- Support iOS 15-16 system jailbreak, Support for Apple A9 to A11, The supported devices include iPhone 6S, SE, 7, 8, X, iPad Air2, iPad mi…☆18Feb 9, 2023Updated 3 years ago
- use the Apple CoreText exploit (CVE-2012-3716) and launch an AP to affect all devices within wifi range☆21Jan 12, 2015Updated 11 years ago
- metasploit loader with antivirus bypass module☆18Jun 26, 2016Updated 9 years ago
- Metasploit Exploit Module for the Android addJavascriptInterface Issue (MITM)☆36Jan 15, 2015Updated 11 years ago
- Repo for proof of concept exploits and tools.☆56Oct 15, 2020Updated 5 years ago
- Automatically exported from code.google.com/p/mtktest☆17Apr 4, 2015Updated 10 years ago
- ZeroRemote Trojan SRC Extract☆19Mar 1, 2017Updated 9 years ago
- ⛏️ A simple page to mine monero using Coin hive☆22Sep 7, 2020Updated 5 years ago
- The Metasploit GUI☆94Oct 18, 2016Updated 9 years ago
- Solutions to the RPISEC MBE / Modern Binary Exploitation VM & course.☆21Feb 5, 2017Updated 9 years ago
- Walking the PEB in VBA☆24Apr 6, 2020Updated 5 years ago
- Attack-Defend CTF Tools☆23Oct 30, 2016Updated 9 years ago
- This is a R.A.T Client for android phones☆25Aug 5, 2017Updated 8 years ago
- A Python based backdoor that uses Steganography and a Cloud Image Service as a command and control server.☆26Sep 2, 2016Updated 9 years ago
- Protects and logs suspicious and malicious usage of .NET CSC.exe and Runtime C# Compilation☆25May 3, 2018Updated 7 years ago
- ViewState Payload Generator☆26Aug 17, 2018Updated 7 years ago
- ☆31Aug 23, 2020Updated 5 years ago
- ☆27Nov 4, 2015Updated 10 years ago
- Check All APK's -- scripts for checking your phone for malware☆30Aug 8, 2017Updated 8 years ago
- Small UI for the https://coin-hive.com/ mining API☆24Apr 1, 2019Updated 6 years ago
- I havent found a reasonable version of the BlackHole exploit kit without the ionCube annoyances; so here is a fix for that problem :) Pl…☆25Dec 14, 2016Updated 9 years ago
- Checker de cuentas Blim para android [TERMUX]☆11Jan 21, 2019Updated 7 years ago
- Core bypass Windows Defender and execute any binary converted to shellcode☆44Oct 12, 2021Updated 4 years ago
- WiFi HID Injector - An USB Rubberducky / BadUSB On Steroids.☆27Aug 23, 2017Updated 8 years ago
- ☆38Mar 4, 2020Updated 5 years ago
- Persistent & Undetectable Malware Backdoor☆28May 8, 2024Updated last year
- Bypass AMSI and Executing PowerShell scripts from C# - using CyberArk's method to bypass AMSI☆31Feb 22, 2020Updated 6 years ago
- A Simple C&C Server Written In Python☆35Nov 6, 2018Updated 7 years ago
- Connectivity notification tool for Android☆11Oct 25, 2014Updated 11 years ago
- Installation: Install the NetHunter-Store app from: https://store.nethunter.com/ From the Kali NetHunter Store, install Termux, NetHunt…☆15Dec 18, 2021Updated 4 years ago