Advanced payload generetor and multi handler
☆37Dec 20, 2020Updated 5 years ago
Alternatives and similar repositories for Red_Hat_exploit
Users that are interested in Red_Hat_exploit are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆19Apr 10, 2021Updated 5 years ago
- Make a 100% FUD Android Trojan and Bypass All Anti-Viruses + Android Google Play Protector☆100Oct 12, 2025Updated 5 months ago
- ☆28Aug 25, 2022Updated 3 years ago
- Tsunami-Fi is simple multi-tool bash application for Wi-Fi attacks☆66Jun 18, 2022Updated 3 years ago
- andro_hack is a framework that generate signed apk payload to penetrate android platforms☆38Feb 14, 2023Updated 3 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- SPY BOMB is a tool used to generate various payloads for android,windows,ios,mac and many more it is very user friendly tool.☆256Dec 31, 2023Updated 2 years ago
- ☆36Oct 19, 2020Updated 5 years ago
- Optimized for use in Kali Linux, KSploit is a user friendly menu driven control panel in which to drive many metasploit tasks. KSploit s…☆17Jul 2, 2025Updated 9 months ago
- python phishing tool☆40Sep 25, 2025Updated 6 months ago
- gathering or searching websites that are vulnerable to sql injection ( GUI Tools )☆33Dec 18, 2019Updated 6 years ago
- Script for quick and easy DOS-attacks on bluetooth devices for pentest purposes☆42Aug 21, 2023Updated 2 years ago
- Virus for windows 100% FUD & bypass any AV☆24Oct 14, 2025Updated 5 months ago
- bypass frp lock on Android phones☆12Apr 20, 2024Updated last year
- Module PMKIDAttack for WiFi Pineapple☆12Oct 6, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- BAIT LINUX Sofware Linux Dirtibution On Android Termux☆16Nov 15, 2021Updated 4 years ago
- It is a simple shell script that brute force Android Lock screen (When USB DEBUGGING is enable) its uses ADB tools FOR BruteForce TO use …☆12Jan 11, 2024Updated 2 years ago
- Black-Tool-For-Windows☆15Sep 8, 2021Updated 4 years ago
- Transform your Android device into a cybersecurity playground with Kali Magic! 🚀☆134Jan 22, 2026Updated 2 months ago
- Small wiki for Mobile Application Penetration Testing Tools☆12Apr 8, 2021Updated 5 years ago
- ☆10Nov 9, 2023Updated 2 years ago
- A tool that allows you to search for vulnerable android devices across the world and exploit them.☆424Sep 3, 2021Updated 4 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆15Jan 9, 2019Updated 7 years ago
- ☆14Jan 8, 2024Updated 2 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Herramienta dirigida exclusivamente al uso de Fuerza Bruta y Ataques de Diccionario a varios tipos de Objetivos. [NO ME HAGO RESPONSABLE …☆58Sep 1, 2023Updated 2 years ago
- Black-Tool for Termux!☆108Jan 1, 2024Updated 2 years ago
- Simple and easy Metasploit payload generator for Linux & Termux☆425Jul 21, 2024Updated last year
- hostapd-mana for the 6.th gen. Wifi Pineapple, and OpenWRT☆21Nov 20, 2021Updated 4 years ago
- Installing Kali on Android device is difficult and easy. Depends on your expertise and how much you can solve the problems you are facing…☆24Sep 6, 2022Updated 3 years ago
- Simple lock screen, power down widget, any key to unlock and more☆20Feb 22, 2011Updated 15 years ago
- A compilation of useful libraries by category when developing for Android.☆10Oct 4, 2014Updated 11 years ago
- A python program to grab Wi-Fi credentials from a windows machine.☆18Feb 28, 2025Updated last year
- Web Vulnerability Scanner.☆13Mar 30, 2022Updated 4 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- VNC Tweaked for Nethunter (prepackaged apk)☆11Apr 24, 2017Updated 8 years ago
- A windows post exploitation tool that contains a lot of features for information gathering and more.☆46Apr 26, 2021Updated 4 years ago
- Fuzz for hidden proxies, vhosts, and URLs☆15Apr 1, 2026Updated last week
- meterpreter☆11Mar 31, 2018Updated 8 years ago
- Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and n…☆18Mar 25, 2023Updated 3 years ago
- Python Exploitation is a collection of special tools for providing high quality penetration testing using pure python programming languag…☆50Apr 2, 2026Updated last week
- my essential APKs fdroid repo☆49Nov 1, 2024Updated last year