Exploiting Android Devices Running Insecure Remote ADB Service
☆20Aug 25, 2018Updated 7 years ago
Alternatives and similar repositories for exploiting-adb
Users that are interested in exploiting-adb are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Email OSINT and password breach hunting. Use h8mail to find passwords through different breach and reconnaissance services, or the infamo…☆10Jun 12, 2019Updated 6 years ago
- Wireless pentesting tool with functionalities such as password cracking (in WEP and WPA/WPA2 networks), DoS attacks, client de-authentica…☆12Apr 8, 2024Updated 2 years ago
- simple script to pwn android phone with physical access☆26Dec 22, 2018Updated 7 years ago
- CVE-2018-19276 - OpenMRS Insecure Object Deserialization RCE☆16Mar 11, 2019Updated 7 years ago
- Config-Exploiter Dump config.php file from joomla and wordpress websites☆39Sep 30, 2018Updated 7 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- The official exploit for Open-AudIT v3.3.1 Remote Code Execution CVE-2020-12078☆18Apr 28, 2020Updated 5 years ago
- RILDefender: An Android Mobile Privacy Protection Service Against SMS Exploits☆16Nov 1, 2024Updated last year
- A simple reverse tcp shell example for Android☆23Jan 4, 2021Updated 5 years ago
- Scanner for public s3 buckets☆12Oct 23, 2017Updated 8 years ago
- Remote Android Management Tool Via ADB☆12Nov 17, 2023Updated 2 years ago
- 通过调用zoomeye来获取安装JBoss机器的地址,然后通过HEAD请求植入webshell。 wxPython写了一个界面的控制程序。☆12Mar 28, 2018Updated 8 years ago
- Android NFC App to read and display the Track 2 information from a PayPass/PayWave card. using EMV library http://sourceforge.net/proje…☆24Mar 12, 2015Updated 11 years ago
- Checks if the given emails have been pwned.☆15May 22, 2023Updated 2 years ago
- python hash cracker☆52Nov 18, 2024Updated last year
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Updated version for the tool UltraRealy with support of the CVE-2019-1040 exploit☆20Jun 19, 2019Updated 6 years ago
- LEMPO (Ldap Exposure on POrtainer) is an exploit for CVE-2018-19466 (LDAP Credentials Disclosure on Portainer). Featured @ DevFest Siberi…☆11May 12, 2020Updated 5 years ago
- Miscellaneous JScript, VBScript, WSF XML, HTA HTML, PowerShell, Batch, etc. for Windows☆15Oct 30, 2017Updated 8 years ago
- Selective wifi jammer - control who can connect where☆48Sep 12, 2017Updated 8 years ago
- How to make a simple IMSI Catcher (Credit: Keld Norman)☆46Feb 24, 2018Updated 8 years ago
- CVE-2017-12149 JBOSS RCE (TESTED)☆15Dec 23, 2017Updated 8 years ago
- A cracker library, much like SentryMBA but with more utilities and uses.☆11Apr 5, 2024Updated 2 years ago
- Exploits for some of the vulnerabilities I have discovered☆19Aug 3, 2020Updated 5 years ago
- ☆10May 22, 2022Updated 3 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Python scripts for doing Android or IOS mobile forensics☆26Sep 28, 2016Updated 9 years ago
- Find plaintext credentials from emails in bulk from password dumps, and generate emails on the fly.☆49Apr 9, 2019Updated 7 years ago
- A collection of awesome lists, manuals, blogs, hacks, one-liners, cli/web tools and more. Especially for System and Network Administrator…☆15Jan 14, 2019Updated 7 years ago
- Android pin cracker☆14Mar 25, 2022Updated 4 years ago
- File system enumerator and monitor for Android and Ubuntu.☆17Sep 25, 2021Updated 4 years ago
- An in-development fork of the Riverloopsec Killerbee Project with additional tools / bugfixes☆11Jan 16, 2018Updated 8 years ago
- a repository of figlet fonts☆22Jul 21, 2013Updated 12 years ago
- Juice Jacking / Automatic Android Rooting based on Intel Edison using dirty c0w☆11Nov 16, 2016Updated 9 years ago
- Turns a list of URLs into hostnames.☆16Feb 9, 2026Updated 2 months ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Learn Cyber Security-1 in 30 Days!☆47Jul 11, 2020Updated 5 years ago
- MSF moudle jboss invoke deploy getshell Exploit & Jboss jmx-console getshell exploit☆22Apr 4, 2019Updated 7 years ago
- Slides of the talk on Injection attacks in apps with NoSQL Backends, given at null OWASP Bangalore monthly meet on 27th April 2019☆23Apr 28, 2019Updated 6 years ago
- ☆15Aug 4, 2023Updated 2 years ago
- CSR2F is a Python tool used for generating CSRF (Cross-Site Request Forgery) exploits☆13Aug 22, 2019Updated 6 years ago
- Learn how to get a reverse shell from JIRA application server☆24Dec 2, 2018Updated 7 years ago
- (Mirror) This module allows for creating a persistent swap space on android☆16Nov 1, 2025Updated 5 months ago