☆1,081Jan 13, 2023Updated 3 years ago
Alternatives and similar repositories for Evil-Droid
Users that are interested in Evil-Droid are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Android APK Antivirus evasion for msfvenom generated payloads to inject into another APK file for phishing attacks.☆105Apr 3, 2017Updated 9 years ago
- Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and et…☆11,193Mar 17, 2024Updated 2 years ago
- backdoor-apk is a shell script that simplifies the process of adding a backdoor to any Android APK file. Users of this shell script shoul…☆2,351Sep 12, 2022Updated 3 years ago
- Android APK Antivirus evasion for msfvenom generated payloads.☆205Aug 26, 2018Updated 7 years ago
- Android Remote Administration Tool☆5,144Aug 12, 2021Updated 4 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- venom - C2 shellcode generator/compiler/handler☆1,947Dec 9, 2023Updated 2 years ago
- Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device.☆3,325Nov 1, 2025Updated 6 months ago
- Efficient and advanced man in the middle framework☆2,180Mar 23, 2023Updated 3 years ago
- Python script to inject existing Android applications with a Meterpreter payload.☆643Jul 21, 2023Updated 2 years ago
- Androspy framework is a Backdoor Crypter & Creator with Automatic IP Poisener☆260Nov 14, 2018Updated 7 years ago
- Avoidz tool to bypass most A.V softwares☆140Sep 28, 2017Updated 8 years ago
- Python antivirus evasion tool☆1,448Oct 21, 2023Updated 2 years ago
- Meterpreter Paranoid Mode - SSL/TLS connections☆291May 14, 2019Updated 6 years ago
- Morpheus - Automating Ettercap TCP/IP (MITM-hijacking Tool)☆877Dec 28, 2018Updated 7 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- A Simple android remote administration tool using sockets. It uses java on the client side and python on the server side☆4,750Jul 17, 2024Updated last year
- Veil 3.1.X (Check version info in Veil at runtime)☆4,214Oct 9, 2023Updated 2 years ago
- A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks☆1,463Nov 3, 2018Updated 7 years ago
- Inject malicious code into *.debs☆287Apr 26, 2022Updated 4 years ago
- Android - Remote Access Trojan List☆1,537Apr 6, 2026Updated last month
- A tool for remote ADB exploitation in Python3 for all Machines.☆876Sep 23, 2024Updated last year
- Phishing Tool & Information Collector☆4,719Oct 29, 2024Updated last year
- QRLJacking or Quick Response Code Login Jacking is a simple-but-nasty attack vector affecting all the applications that relays on “Login…☆1,537Aug 7, 2025Updated 9 months ago
- A tool to help you manage your leaks☆35Nov 22, 2017Updated 8 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- The LAZY script will make your life easier, and of course faster.☆4,321Aug 28, 2021Updated 4 years ago
- Know the dangers of credential reuse attacks.☆2,107Dec 9, 2025Updated 5 months ago
- Aircrack, Airodump, Aireplay, MDK3 and Reaver GUI Application for Android☆2,529Aug 26, 2020Updated 5 years ago
- A script written lazily for generating cross-platform backdoors on the go :)☆190Oct 16, 2018Updated 7 years ago
- Python Remote Access Trojan☆146Jul 28, 2020Updated 5 years ago
- Accurately Locate Smartphones using Social Engineering☆9,368May 7, 2025Updated last year
- All in one tool for Information Gathering, Vulnerability Scanning and Crawling. A must have tool for all penetration testers☆3,598Jul 31, 2024Updated last year
- Cromos is a tool for downloading legitimate extensions of the Chrome Web Store and inject codes in the background of the application.☆126Dec 13, 2017Updated 8 years ago
- Generate unicode domains for IDN Homograph Attack and detect them.☆1,259Apr 26, 2022Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- X Attacker Tool ☣ Website Vulnerability Scanner & Auto Exploiter☆1,737Oct 8, 2023Updated 2 years ago
- Multiplatform payload dropper☆279Aug 17, 2021Updated 4 years ago
- Image Payload Creating/Injecting tools☆1,293Nov 30, 2023Updated 2 years ago
- BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be us…☆770Apr 5, 2020Updated 6 years ago
- androrat☆2,014Apr 12, 2023Updated 3 years ago
- Undetectable Windows Payload Generation☆1,608Nov 8, 2022Updated 3 years ago
- ASTROID v 1.2 bypass most A.V softwares☆88Jun 18, 2017Updated 8 years ago