simple script that helps you to Embed a Payload into an Apk easly
☆20Feb 22, 2019Updated 7 years ago
Alternatives and similar repositories for Ad-injector
Users that are interested in Ad-injector are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- iPeeU stands for iP[ad,hone,od]Unlocker that brute force cracks the PIN of an iDevice☆15Oct 30, 2015Updated 10 years ago
- Writing Spyware Made Easy - POC spyware Chrome Extension/Server☆40Apr 8, 2018Updated 7 years ago
- Avoidz tool to bypass most A.V softwares☆140Sep 28, 2017Updated 8 years ago
- C# code for Transferring Backdoor Payloads by DNS Traffic and Bypassing Anti-viruses☆271Jun 5, 2023Updated 2 years ago
- 💻 GitClin V1.0 for downloading and installing tools☆15Mar 30, 2018Updated 7 years ago
- ASTROID v 1.2 bypass most A.V softwares☆88Jun 18, 2017Updated 8 years ago
- ARCANUS is a customized payload generator/handler.☆145Feb 27, 2018Updated 8 years ago
- C# code for Transferring Backdoor Payloads by IPv6 Address (AAAA) records and DNS Traffic also Bypassing Anti-viruses☆31Jun 5, 2023Updated 2 years ago
- Techniques that i have used to evade anti-virus during pen tests.☆13May 29, 2018Updated 7 years ago
- PRESTASHOP Modules Shell Exploit☆11Sep 9, 2017Updated 8 years ago
- Bypass AMSI and Executing PowerShell scripts from C# - using CyberArk's method to bypass AMSI☆31Feb 22, 2020Updated 6 years ago
- using VBS to download and install a powershell malware☆39Jun 28, 2019Updated 6 years ago
- My collection of metasploit auxiliary post-modules☆192May 25, 2019Updated 6 years ago
- pinky - The PHP mini RAT (Remote Administration Tool)☆77Sep 7, 2018Updated 7 years ago
- Hercules - Automated VPN Connect ✔️☆48May 2, 2018Updated 7 years ago
- Communicate with government surveillance programs via your metadata.☆27Oct 9, 2018Updated 7 years ago
- Create new Vala projects with ease☆12Aug 27, 2018Updated 7 years ago
- Utility to generate a TLS Certificate.☆17Apr 11, 2020Updated 5 years ago
- Automated Security Assessment Reporting Tool☆37Dec 23, 2017Updated 8 years ago
- Kill AMSI in a remote process PoC☆10Aug 18, 2018Updated 7 years ago
- A simple example of botnet using IPFS and IPNS protocols as way for controller of botnet☆17May 4, 2018Updated 7 years ago
- dmg2img converter, used to flash DMG images on the fly on EtchDroid☆16Aug 17, 2018Updated 7 years ago
- ☆13Jun 1, 2021Updated 4 years ago
- Now I shall sing the second kingdom there where the soul of man is cleansed, made worthy to ascend to Heaven.☆12Dec 15, 2025Updated 3 months ago
- iDevice Jailbreak Utilities☆20Dec 31, 2010Updated 15 years ago
- ☆14Sep 22, 2019Updated 6 years ago
- Wordpress AFD dl-skin.php Exploit☆16May 3, 2017Updated 8 years ago
- the reflective tower Blond by Olivier Danvy & Karoline Malmkjær☆16May 21, 2025Updated 10 months ago
- Web Based PDF Template Generator built for Flying Saucer☆12Oct 20, 2019Updated 6 years ago
- Use powershell to getsystem with token dumplication☆10Dec 6, 2019Updated 6 years ago
- The Recon scanning tool scans websites for open files & directories specified in the custom config file. Default server configuration fil…☆15Apr 4, 2018Updated 7 years ago
- I reworked the Go Windows Backdoor to use AES encryption.☆18Jul 19, 2017Updated 8 years ago
- WebFuzzer - Web Application Security Scanner by Cystack Team☆25Mar 14, 2017Updated 9 years ago
- FBTrueType is a standalone native ARM program for ROOTED Android devices, which renders TrueType text to the device display, using the ke…☆10Aug 23, 2015Updated 10 years ago
- Python based Office Macro Generator. Also does rudamentary obfuscation.☆12Jun 6, 2016Updated 9 years ago
- enigma2 plugin project example with Docker and VS Code configuration☆16Feb 11, 2021Updated 5 years ago
- website admin panel finder☆34Dec 29, 2020Updated 5 years ago
- venom - C2 shellcode generator/compiler/handler☆1,943Dec 9, 2023Updated 2 years ago
- A shell script to build fancy DMGs☆11Sep 10, 2018Updated 7 years ago