Ch0pin / AndroidWebDoor
A minimalistic android backdoor
β16Updated 4 years ago
Alternatives and similar repositories for AndroidWebDoor:
Users that are interested in AndroidWebDoor are comparing it to the libraries listed below
- π Reverse shell written on python3β14Updated 4 years ago
- BurpDroid is a web application debugging tool for Android and is often used for checking web application security. Itβs a proxy-based tooβ¦β10Updated 3 years ago
- Disable Windows Defender All Versionβ31Updated 4 years ago
- Nexus of Android banking Trojansβ15Updated last year
- Spider or repeater to find all links.β13Updated 4 years ago
- A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (Pβ¦β34Updated 5 years ago
- NooB PyThon Matasploit Av Bypasser By Ali khanβ8Updated 4 years ago
- JALSI - Just Another Lame Shellcode Injectorβ30Updated 3 years ago
- Some stealers in one. Simple to use.β6Updated 4 years ago
- Red Team C2 and Post Exploitation Codeβ36Updated last month
- TP-Link Archer C50 V3 devices before Build 200318 Rel. 62209 allows remote attackers to cause a denial of service via a crafted HTTP Headβ¦β19Updated 5 years ago
- Handy script to automate the attackβ20Updated 5 years ago
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engagemeβ¦β19Updated 2 years ago
- Quickly generate every payload type for each listener and optionally host via HTTP.β22Updated 3 years ago
- A dropper that decrypts encrypted xor payload and can inject it in explorer.exe proccessβ9Updated 3 years ago
- Bind shell that uses Named Pipes as transport and execute PowerShell code through Runspaces.β16Updated 5 years ago
- A simple command line tool designed to explore the mechanics of dictionary attacks on the FTP protocol.β20Updated 3 years ago
- Recon-ng modules for basic OSINT.β11Updated 3 years ago
- A malicious .cab creation tool for CVE-2021-40444β12Updated 3 years ago
- A custom run space to bypass AMSI and Constrained Language mode in PowerShell.β20Updated last year
- Machine Learning basics with phishing datasetβ11Updated 4 years ago
- A Cross Platform multifunctional (Windows/Linux/Mac) RAT.β16Updated 4 years ago
- Stealer of sessions of the Telegram Desktop application on windows 7, 8 and 10 πβ9Updated 4 years ago
- jgraphx 4.0.4 build for cs projectβ22Updated 4 years ago
- This tool will help in generating reverse shells easily for all types of OS.β19Updated last year
- Simple class to search and upload filesβ27Updated 5 years ago
- PoC Dumb Ransomware payload. Any malicious use of this code is strictly prohibited.β29Updated 11 months ago
- C# Admin Control Panel Finder For Windowsβ42Updated 5 years ago
- the metasploit script(POC/EXP) about CVE-2021-22005 VMware vCenter Server contains an arbitrary file upload vulnerabilityβ24Updated 3 years ago
- The best way to send emails in Go.β10Updated 4 years ago