☆1,080Jan 13, 2023Updated 3 years ago
Alternatives and similar repositories for Evil-Droid
Users that are interested in Evil-Droid are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Android APK Antivirus evasion for msfvenom generated payloads to inject into another APK file for phishing attacks.☆105Apr 3, 2017Updated 9 years ago
- Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and et…☆11,133Mar 17, 2024Updated 2 years ago
- backdoor-apk is a shell script that simplifies the process of adding a backdoor to any Android APK file. Users of this shell script shoul…☆2,346Sep 12, 2022Updated 3 years ago
- Android APK Antivirus evasion for msfvenom generated payloads.☆205Aug 26, 2018Updated 7 years ago
- Android Remote Administration Tool☆5,133Aug 12, 2021Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- venom - C2 shellcode generator/compiler/handler☆1,941Dec 9, 2023Updated 2 years ago
- Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device.☆3,315Nov 1, 2025Updated 5 months ago
- Efficient and advanced man in the middle framework☆2,179Mar 23, 2023Updated 3 years ago
- Python script to inject existing Android applications with a Meterpreter payload.☆643Jul 21, 2023Updated 2 years ago
- Androspy framework is a Backdoor Crypter & Creator with Automatic IP Poisener☆259Nov 14, 2018Updated 7 years ago
- Avoidz tool to bypass most A.V softwares☆140Sep 28, 2017Updated 8 years ago
- Python antivirus evasion tool☆1,447Oct 21, 2023Updated 2 years ago
- Meterpreter Paranoid Mode - SSL/TLS connections☆291May 14, 2019Updated 6 years ago
- Morpheus - Automating Ettercap TCP/IP (MITM-hijacking Tool)☆876Dec 28, 2018Updated 7 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Veil 3.1.X (Check version info in Veil at runtime)☆4,211Oct 9, 2023Updated 2 years ago
- A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks☆1,458Nov 3, 2018Updated 7 years ago
- Inject malicious code into *.debs☆287Apr 26, 2022Updated 3 years ago
- Android - Remote Access Trojan List☆1,528Apr 6, 2026Updated last week
- A tool for remote ADB exploitation in Python3 for all Machines.☆873Sep 23, 2024Updated last year
- Phishing Tool & Information Collector☆4,711Oct 29, 2024Updated last year
- Evil-Droid is a framework that creates & generates & embed apk payload to penetrate Android platforms.☆44May 7, 2023Updated 2 years ago
- QRLJacking or Quick Response Code Login Jacking is a simple-but-nasty attack vector affecting all the applications that relays on “Login…☆1,529Aug 7, 2025Updated 8 months ago
- A tool to help you manage your leaks☆34Nov 22, 2017Updated 8 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- The LAZY script will make your life easier, and of course faster.☆4,319Aug 28, 2021Updated 4 years ago
- Know the dangers of credential reuse attacks.☆2,102Dec 9, 2025Updated 4 months ago
- Aircrack, Airodump, Aireplay, MDK3 and Reaver GUI Application for Android☆2,522Aug 26, 2020Updated 5 years ago
- A script written lazily for generating cross-platform backdoors on the go :)☆190Oct 16, 2018Updated 7 years ago
- Python Remote Access Trojan☆146Jul 28, 2020Updated 5 years ago
- Accurately Locate Smartphones using Social Engineering☆9,236May 7, 2025Updated 11 months ago
- All in one tool for Information Gathering, Vulnerability Scanning and Crawling. A must have tool for all penetration testers☆3,577Jul 31, 2024Updated last year
- Cromos is a tool for downloading legitimate extensions of the Chrome Web Store and inject codes in the background of the application.☆126Dec 13, 2017Updated 8 years ago
- Generate unicode domains for IDN Homograph Attack and detect them.☆1,255Apr 26, 2022Updated 3 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- X Attacker Tool ☣ Website Vulnerability Scanner & Auto Exploiter☆1,728Oct 8, 2023Updated 2 years ago
- Multiplatform payload dropper☆278Aug 17, 2021Updated 4 years ago
- BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be us…☆770Apr 5, 2020Updated 6 years ago
- Image Payload Creating/Injecting tools☆1,291Nov 30, 2023Updated 2 years ago
- androrat☆2,006Apr 12, 2023Updated 3 years ago
- Undetectable Windows Payload Generation☆1,610Nov 8, 2022Updated 3 years ago
- ASTROID v 1.2 bypass most A.V softwares☆88Jun 18, 2017Updated 8 years ago