A collection of tools for android devices to test the security of networks. FOR EDUCATIONAL PURPOSES ONLY!
β52Nov 23, 2014Updated 11 years ago
Alternatives and similar repositories for Android-Network-Penetration-Tools-
Users that are interested in Android-Network-Penetration-Tools- are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Spin up any(almost) llm locally!β14Dec 4, 2023Updated 2 years ago
- π Hunt down social media accounts by username across social networksβ11Mar 14, 2020Updated 6 years ago
- Bluetooth rubberducky, Keyboard & Mouse Emulator for Kali NetHunter and NetHunter Proβ15Nov 30, 2025Updated 3 months ago
- β17Oct 10, 2023Updated 2 years ago
- Android libraries and/or signatures with classification (type, tags, anti-features)β24Nov 3, 2022Updated 3 years ago
- Scripts and Tips for Kali Linux Pi-Tail Editionβ11Dec 8, 2023Updated 2 years ago
- β10Apr 18, 2019Updated 6 years ago
- A Flutter Plugin to check Android device Root status and execute shell commands with root privilegesβ25Sep 22, 2022Updated 3 years ago
- β16Aug 16, 2022Updated 3 years ago
- Search Termux Commands and Guide in Termux !!β11Apr 29, 2022Updated 3 years ago
- Tools and scripts dedicated to Android application securityβ53Mar 3, 2021Updated 5 years ago
- A bucket of various work-in-progress rtl-sdr ideas.β22Mar 5, 2017Updated 9 years ago
- FBBrute FBBrute is a Facebook brute force tool, launches an attack by guessing the target password with a set of wordlist provided. so thβ¦β17Jul 22, 2023Updated 2 years ago
- A sample app to show how to receive packets via PCAPdroidβ28Dec 29, 2024Updated last year
- β14Jan 3, 2024Updated 2 years ago
- A tool for reverse engineering Android apk filesβ13Nov 30, 2018Updated 7 years ago
- Alfred is a advanced OSINT information gathering toolβ11Nov 14, 2025Updated 4 months ago
- This tool provides detailed analysis of changes between iOS firmware versions and their potential impact on device functionality.β13Nov 4, 2024Updated last year
- Your journey to master Androidβ’ Shell begins hereβ24Jun 7, 2022Updated 3 years ago
- Automation with SSH for Hackingβ10Jan 28, 2025Updated last year
- bypass new soc qualcomβ10Jan 27, 2021Updated 5 years ago
- A magisk module to use any Sony exclusive appβ10May 22, 2019Updated 6 years ago
- Restores firmware and filesystem to iPhone/iPod Touchβ11Jun 7, 2010Updated 15 years ago
- How to hack webcamsβ10Jan 7, 2022Updated 4 years ago
- Python based Web Scraper which can discover JavaScript files and parse them for juicy information (API keys, IP's, Hidden Paths etc)β16Feb 17, 2022Updated 4 years ago
- Console utility for working with device partitions based on the Qualcomm processor for Linuxβ23Nov 14, 2025Updated 4 months ago
- Easy to use, config oriented, instagram bot, written in python 3β10Jul 15, 2022Updated 3 years ago
- A lightweight record-replay reverse proxy for testingβ21Feb 20, 2026Updated last month
- Common Proprietary Qualcomm Binariesβ10Dec 26, 2016Updated 9 years ago
- Automatically exported from code.google.com/p/droidsheepβ14Sep 12, 2015Updated 10 years ago
- Scripts for switching to monitor mode on devices with Qualcomm driversβ36Jan 22, 2020Updated 6 years ago
- β12Jan 31, 2026Updated last month
- Something To Do Android Application Security Researchβ10May 14, 2021Updated 4 years ago
- This tool is for flashing qualcomm devices.β10Feb 22, 2021Updated 5 years ago
- A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228β13Dec 13, 2021Updated 4 years ago
- Bringing Mandatory Access Control to Android appsβ11Dec 20, 2021Updated 4 years ago
- DroidSheep [Root] is an Android app for Security analysis in wireless networks and capturing facebook, twitter, linkedin and other accounβ¦β26Jun 29, 2012Updated 13 years ago
- Automatic background updater for modern Android. See https://github.com/GrapheneOS/script/blob/16-qpr2/generate-metadata for the server mβ¦β45Updated this week
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in β¦β11Jun 21, 2018Updated 7 years ago