backdoor-apk is a shell script that simplifies the process of adding a backdoor to any Android APK file. Users of this shell script should have working knowledge of Linux, Bash, Metasploit, Apktool, the Android SDK, smali, etc. This shell script is provided as-is without warranty of any kind and is intended for educational purposes only.
☆20Jul 22, 2016Updated 9 years ago
Alternatives and similar repositories for backdoor-apk
Users that are interested in backdoor-apk are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Python automated wifi jammer☆41Mar 24, 2016Updated 10 years ago
- All things to do after installing Kali Linux and Add more awesome hacking tools to your Kali Linux system☆523Oct 1, 2020Updated 5 years ago
- ☆11Jan 2, 2022Updated 4 years ago
- Ruby library for interacting with Bugcrowd's VRT☆14Mar 6, 2026Updated 2 months ago
- TikSub adalah alat berbasis Python yang memanfaatkan platform Traodoisub untuk menukar koin menjadi followers, likes, dan views TikTok. C…☆16Aug 9, 2025Updated 8 months ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Adama - Command and Invoker Pattern For Getting Things Done☆13Aug 10, 2023Updated 2 years ago
- This is a fuzzer for automated web application scanners and vulnerability scanners. The idea is to send an unexpectedly large response to…☆24Oct 11, 2015Updated 10 years ago
- pour plus de tutos veuillez visiter le site☆11Sep 21, 2020Updated 5 years ago
- Change your Ip address☆15Feb 27, 2022Updated 4 years ago
- ☆17Aug 3, 2021Updated 4 years ago
- Command line text processing with Rust tools☆20May 14, 2022Updated 3 years ago
- Brutteforce for stego CTFs☆17Nov 2, 2022Updated 3 years ago
- RSYaba Modular Brute Force Attacker☆19Jun 2, 2014Updated 11 years ago
- Bypass XSS Reflected Cross-site scripting☆33Oct 15, 2015Updated 10 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.☆14Nov 29, 2023Updated 2 years ago
- all about android reverse engineering☆12Oct 3, 2020Updated 5 years ago
- Collection of cracked malware☆15Dec 28, 2018Updated 7 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆11Aug 17, 2020Updated 5 years ago
- This Script contains tools like assetfinder, amass, httprobe, subjack, nmap, waybackurls and gowitness☆14Mar 31, 2022Updated 4 years ago
- This Tool Is For Styling Termux.By This Tool You Will Get a Login Method.Also You Can Remove Any Types Of Banner By This Tool☆15Mar 19, 2023Updated 3 years ago
- ⚑ We put the "ethical" in "ethical hacking." ⚑☆13Feb 14, 2021Updated 5 years ago
- ☆23Jan 29, 2023Updated 3 years ago
- keylogger extension chrome, get cookie, redirection to fake web site or a nother website☆16Sep 21, 2020Updated 5 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- hcidump for android☆11Jan 28, 2015Updated 11 years ago
- exFAT FUSE implementation☆10Dec 11, 2021Updated 4 years ago
- Wi-Fi Surveying: wardriving, datasets, statistics, tools, and more.☆16Oct 10, 2023Updated 2 years ago
- Windows Keylogger in C++☆19Nov 2, 2022Updated 3 years ago
- SAPProx is a proof of concept tool for intercepting and modifying SAP GUI (DIAG protocol) traffic.☆13Apr 20, 2017Updated 9 years ago
- first program python to steal password microsoft edge all version browser, send info to email☆13Feb 11, 2021Updated 5 years ago
- An automated way to send phishing emails from Google/G-suite.☆18Nov 30, 2018Updated 7 years ago
- ransomware encrypte all filles,disque C,disque D,Usb ...etc, filles can not be decrypted☆17Nov 18, 2018Updated 7 years ago
- Basics on commands/tools/info on how to do a forensic analysis of a mobile phone☆34Apr 27, 2023Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Corporative registry worldwide catalog. 63 countries☆16Jun 24, 2022Updated 3 years ago
- bash script to automate wardriving tasks. (Wi-Fi & Bluetooth)☆12Feb 14, 2023Updated 3 years ago
- ☆13Feb 23, 2026Updated 2 months ago
- steal password mozilla firefox ,windows,Linux☆10Oct 12, 2020Updated 5 years ago
- 1000 black hat tools Collected From github☆82Dec 12, 2023Updated 2 years ago
- ISR-sqlget It's a blind SQL injection tool developed in Perl.☆14Apr 26, 2013Updated 13 years ago
- Automatic DLL comment link generation and explaination of the DLL Proxying techniques☆10Aug 19, 2021Updated 4 years ago