AndroVirus / getdroidLinks
☆22Updated 6 years ago
Alternatives and similar repositories for getdroid
Users that are interested in getdroid are comparing it to the libraries listed below
Sorting:
- Wi-Fi tools keep getting more and more accessible to beginners, and the Ehtools Framework is a framework of serious penetration tools tha…☆15Updated 7 years ago
- Fastest tool to find username and password brute forcing.☆74Updated 2 years ago
- CamRaptor is a tool that exploits several vulnerabilities in popular DVR cameras to obtain network camera credentials.☆238Updated last year
- The purpose of this tool is to test the window10 defender protection and also other antivirus protection.☆94Updated 2 years ago
- CROSS PLATFORM REMOTE ACCESS TROJAN (RAT)☆112Updated 4 months ago
- Arkhota, a web brute forcer for Android.☆19Updated 2 years ago
- DirBruter is a Python based CLI tool. It looks for hidden or existing directories/files using brute force method. It basically works by l…☆17Updated 2 years ago
- Personally developed tools for buffer overflow attacks☆24Updated 3 years ago
- Sqlmap for lazy people☆18Updated 5 years ago
- ./kumasia php simple backdoor☆23Updated 7 months ago
- Okadminfinder rewrite by Xnuvers007☆16Updated 4 years ago
- steal chrome saved passwords "undetectable"☆51Updated 3 years ago
- Perform With Mass Exploiter In Joomla 4.2.8.☆35Updated 2 years ago
- An Android RAT that written in C# by me☆59Updated 5 years ago
- Automated Linux service that collects information on local Wi-Fi networks and performs deauthentication attacks.☆68Updated 2 years ago
- A framework for bug hunting or pentesting targeting websites that have CVE-2021-41773 Vulnerability in public☆63Updated 4 years ago
- Advanced Android AV Evasion Tool Written In Python 3 that can Embed/Bind meterpreter APK to any Legitimate APK☆296Updated last year
- The SteaLinG is an open-source penetration testing framework designed for social engineering☆240Updated last year
- Android Keylogger and Trojan☆50Updated 2 years ago
- Este troyano para Android es uno de los más completos. Con él vamos a poder tener acceso a remoto a todo el dispositivo infectado, desde …☆125Updated last year
- BackdoorSim: An Educational into Remote Administration Tools☆119Updated 2 years ago
- Proof of Concept (PoC) CVE-2021-4034☆99Updated 4 years ago
- A reverse TCP payload and listener both written in python3.☆30Updated last year
- C2 framework with modular and extensible architecture, task scheduler, remote shell live sessions and a retro look-feeling interface whic…☆43Updated 3 years ago
- ( Wordpress Exploit ) Wordpress Multiple themes - Unauthenticated Arbitrary File Upload☆10Updated 3 years ago
- A Simple Script For SSH BruteForce☆38Updated 2 years ago
- D3Ext's Forward Shell☆120Updated 2 years ago
- Powerfull Automatic Sql injection Tools Pack☆122Updated 4 years ago
- Usage of WH-HackerExploit Hacking Tool for attacking targets without prior mutual consent is illegal. It's the end user's responsibility …☆38Updated 3 years ago
- Phishing mobile application made in React Native for both Android and iOS devices.☆34Updated 4 years ago