simple script that helps you to Embed a Payload into an Apk easly
☆20Feb 22, 2019Updated 7 years ago
Alternatives and similar repositories for Ad-injector
Users that are interested in Ad-injector are comparing it to the libraries listed below
Sorting:
- Writing Spyware Made Easy - POC spyware Chrome Extension/Server☆40Apr 8, 2018Updated 7 years ago
- iPeeU stands for iP[ad,hone,od]Unlocker that brute force cracks the PIN of an iDevice☆15Oct 30, 2015Updated 10 years ago
- Avoidz tool to bypass most A.V softwares☆139Sep 28, 2017Updated 8 years ago
- ☆26Apr 29, 2017Updated 8 years ago
- WebFuzzer - Web Application Security Scanner by Cystack Team☆25Mar 14, 2017Updated 8 years ago
- Communicate with government surveillance programs via your metadata.☆26Oct 9, 2018Updated 7 years ago
- Mirai Botnet DB Project☆26Mar 20, 2019Updated 6 years ago
- C# code for Transferring Backdoor Payloads by DNS Traffic and Bypassing Anti-viruses☆271Jun 5, 2023Updated 2 years ago
- Bypass AMSI and Executing PowerShell scripts from C# - using CyberArk's method to bypass AMSI☆31Feb 22, 2020Updated 6 years ago
- My collection of metasploit auxiliary post-modules☆192May 25, 2019Updated 6 years ago
- A fileless Windows keylogger that exfils via DNS.☆32Apr 21, 2017Updated 8 years ago
- pinky - The PHP mini RAT (Remote Administration Tool)☆77Sep 7, 2018Updated 7 years ago
- ☆10Jul 16, 2024Updated last year
- Techniques that i have used to evade anti-virus during pen tests.☆13May 29, 2018Updated 7 years ago
- A HTTP bot in Java with basic commands and ability's☆10Aug 20, 2015Updated 10 years ago
- Automated Security Assessment Reporting Tool☆37Dec 23, 2017Updated 8 years ago
- ARCANUS is a customized payload generator/handler.☆145Feb 27, 2018Updated 8 years ago
- website admin panel finder☆34Dec 29, 2020Updated 5 years ago
- An Exploitation script developed to exploit the CVE-2023-4966 bleed citrix information disclosure vulnerability☆10Oct 29, 2023Updated 2 years ago
- Shortcuts to make git pull requests take less keystrokes☆12Dec 8, 2023Updated 2 years ago
- Peer to Peer Payments via NFC - Built for IC Hack 2014☆10Dec 19, 2016Updated 9 years ago
- A python script to download spotify playlists and albums via youtube☆14May 6, 2020Updated 5 years ago
- Exploiting Android devices☆10Sep 12, 2022Updated 3 years ago
- Framework for Rogue Wi-Fi Access Point Attack☆12Aug 31, 2015Updated 10 years ago
- ☆10Apr 18, 2019Updated 6 years ago
- The Art of the Steal / Deal - Made in Austria - Collection of Token White Papers on the Blockchain - Incl. Scam Alert - Thanks for your m…☆10Jan 2, 2021Updated 5 years ago
- An Ash module that interfaces with the Github API☆10Oct 9, 2017Updated 8 years ago
- A simple static site generator, using Markdown and Bash☆11Aug 24, 2020Updated 5 years ago
- DEPRECATED - A library for accessing a user's Firefox data: history, bookmarks, etc.☆40Mar 30, 2019Updated 6 years ago
- Finally, reverse/bind shells written in python, encrypted with ssl!☆39Nov 1, 2019Updated 6 years ago
- using VBS to download and install a powershell malware☆39Jun 28, 2019Updated 6 years ago
- CVE-2018-6546-Exploit☆41Apr 15, 2018Updated 7 years ago
- Simple Antivirus☆10Dec 24, 2016Updated 9 years ago
- ☆11Jan 6, 2022Updated 4 years ago
- Simple Python module to call termux-api by subprocess.☆12May 13, 2025Updated 9 months ago
- Local File Inclusion (LFI) in FHEM 6.0 allows an attacker to include a file, it can lead to sensitive information disclosure.☆12Jan 20, 2021Updated 5 years ago
- Utility to generate a TLS Certificate.☆17Apr 11, 2020Updated 5 years ago
- unite-pull-request is a unite.vim plugin for Viewing GitHub pull request.☆23Feb 18, 2015Updated 11 years ago
- Writing an ELF binary by hand☆12Oct 17, 2023Updated 2 years ago