☆1,078Jan 13, 2023Updated 3 years ago
Alternatives and similar repositories for Evil-Droid
Users that are interested in Evil-Droid are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Android APK Antivirus evasion for msfvenom generated payloads to inject into another APK file for phishing attacks.☆107Apr 3, 2017Updated 8 years ago
- Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and et…☆11,108Mar 17, 2024Updated 2 years ago
- backdoor-apk is a shell script that simplifies the process of adding a backdoor to any Android APK file. Users of this shell script shoul…☆2,346Sep 12, 2022Updated 3 years ago
- Android APK Antivirus evasion for msfvenom generated payloads.☆204Aug 26, 2018Updated 7 years ago
- Android Remote Administration Tool☆5,096Aug 12, 2021Updated 4 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- venom - C2 shellcode generator/compiler/handler☆1,943Dec 9, 2023Updated 2 years ago
- Evil-Droid is a framework that create & generate & embed apk payload to penetrate android platforms☆27Jun 30, 2019Updated 6 years ago
- Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device.☆3,304Nov 1, 2025Updated 4 months ago
- Efficient and advanced man in the middle framework☆2,178Mar 23, 2023Updated 3 years ago
- Python script to inject existing Android applications with a Meterpreter payload.☆644Jul 21, 2023Updated 2 years ago
- Androspy framework is a Backdoor Crypter & Creator with Automatic IP Poisener☆260Nov 14, 2018Updated 7 years ago
- Avoidz tool to bypass most A.V softwares☆140Sep 28, 2017Updated 8 years ago
- Python antivirus evasion tool☆1,450Oct 21, 2023Updated 2 years ago
- Meterpreter Paranoid Mode - SSL/TLS connections☆291May 14, 2019Updated 6 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Morpheus - Automating Ettercap TCP/IP (MITM-hijacking Tool)☆876Dec 28, 2018Updated 7 years ago
- A Simple android remote administration tool using sockets. It uses java on the client side and python on the server side☆4,672Jul 17, 2024Updated last year
- Veil 3.1.X (Check version info in Veil at runtime)☆4,217Oct 9, 2023Updated 2 years ago
- A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks☆1,457Nov 3, 2018Updated 7 years ago
- Inject malicious code into *.debs☆285Apr 26, 2022Updated 3 years ago
- Android - Remote Access Trojan List☆1,524Updated this week
- A tool for remote ADB exploitation in Python3 for all Machines.☆873Sep 23, 2024Updated last year
- Phishing Tool & Information Collector☆4,692Oct 29, 2024Updated last year
- Evil-Droid is a framework that creates & generates & embed apk payload to penetrate Android platforms.☆43May 7, 2023Updated 2 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- QRLJacking or Quick Response Code Login Jacking is a simple-but-nasty attack vector affecting all the applications that relays on “Login…☆1,526Aug 7, 2025Updated 7 months ago
- A tool to help you manage your leaks☆34Nov 22, 2017Updated 8 years ago
- The LAZY script will make your life easier, and of course faster.☆4,318Aug 28, 2021Updated 4 years ago
- Know the dangers of credential reuse attacks.☆2,103Dec 9, 2025Updated 3 months ago
- Aircrack, Airodump, Aireplay, MDK3 and Reaver GUI Application for Android☆2,518Aug 26, 2020Updated 5 years ago
- A script written lazily for generating cross-platform backdoors on the go :)☆190Oct 16, 2018Updated 7 years ago
- Python Remote Access Trojan☆146Jul 28, 2020Updated 5 years ago
- Accurately Locate Smartphones using Social Engineering☆9,172May 7, 2025Updated 10 months ago
- All in one tool for Information Gathering, Vulnerability Scanning and Crawling. A must have tool for all penetration testers☆3,571Jul 31, 2024Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Generate unicode domains for IDN Homograph Attack and detect them.☆1,252Apr 26, 2022Updated 3 years ago
- X Attacker Tool ☣ Website Vulnerability Scanner & Auto Exploiter☆1,725Oct 8, 2023Updated 2 years ago
- Cromos is a tool for downloading legitimate extensions of the Chrome Web Store and inject codes in the background of the application.☆126Dec 13, 2017Updated 8 years ago
- BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be us…☆771Apr 5, 2020Updated 5 years ago
- Multiplatform payload dropper☆281Aug 17, 2021Updated 4 years ago
- Image Payload Creating/Injecting tools☆1,291Nov 30, 2023Updated 2 years ago
- androrat☆2,006Apr 12, 2023Updated 2 years ago