BushidoUK / Android-Banking-Trojan-Nexus
Nexus of Android banking Trojans
☆15Updated last year
Alternatives and similar repositories for Android-Banking-Trojan-Nexus:
Users that are interested in Android-Banking-Trojan-Nexus are comparing it to the libraries listed below
- Another vulnerability scanner☆17Updated last year
- Machine Learning basics with phishing dataset☆10Updated 3 years ago
- Automated Penetration Testing☆14Updated 4 years ago
- PoC Dumb Ransomware payload. Any malicious use of this code is strictly prohibited.☆28Updated 8 months ago
- serve and destroy aka phisherprice lite is a multi functional pen testing script designed on parrot and kali☆9Updated 2 years ago
- ☆51Updated 3 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆17Updated 4 years ago
- Hashes of infamous malware☆25Updated last year
- Bash Script with 4 ways to get persistence in Linux systems WITHOUT root permisions☆13Updated 2 years ago
- Basic guide for performing a Physical PenTest - Nist 800-12, 800-53, 800-115, 800-152☆18Updated 2 years ago
- Red Teaming Tactics and Techniques☆14Updated 2 years ago
- wpscvn is a tool for pentesters, website owner to test if their websites had some vulnerable plugins or themes☆15Updated 6 years ago
- Hack Windows with FUD backdoor/payload, Escalates LINUX privileges, Devastate Linux, Tunnel forwarding☆14Updated 4 years ago
- The Catherine Framework is a general-purpose cybersecurity framework built to provide extended support for defense operations.☆16Updated 9 months ago
- Repository of tools used in my blog☆50Updated 10 months ago
- Simple Imager has been created for performing live acquisition of Windows based systems in a forensically sound manner☆32Updated 2 years ago
- RedBlock is an Nginx module designed for offensive security operations and red teaming. This module empowers security professionals to ea…☆20Updated last year
- Automate Blind SQL Injection with Python.☆20Updated 2 years ago
- Scan and decode NetWire logs☆11Updated 2 years ago
- Automate the creation of Backdoors and postexplotation activities☆22Updated 2 years ago
- Active Directory information dumper via LDAP☆12Updated 4 years ago
- Burp suite Certificate modification tool☆18Updated last year
- Spider or repeater to find all links.☆13Updated 3 years ago
- IP-Finder is an Open Source Intelligence (OSINT) tool that helps collect IPs of Companies, Servers, Operating Systems and much more. It a…☆11Updated 2 years ago
- Recon-ng modules for basic OSINT.☆11Updated 2 years ago
- ☆17Updated last year
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBin☆15Updated 4 years ago
- crawl a website for links and expose all the vulnerable parameters.☆13Updated 2 years ago
- Enumeration & fingerprint tool☆24Updated 10 months ago
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆12Updated 2 years ago