Prochainezo / iOSbdLinks
Install a Persistent Backdoor on Jailbroken iOS Devices
☆29Updated 10 years ago
Alternatives and similar repositories for iOSbd
Users that are interested in iOSbd are comparing it to the libraries listed below
Sorting:
- Graphical user interface for the windows version of THC Hydra☆55Updated 7 years ago
- PoC Android smart phone botnet☆78Updated 13 years ago
- A Modular Web Vulnerability Scanner☆51Updated 14 years ago
- ☆18Updated 7 years ago
- IOS/MAC Denial-Of-Service [POC/EXPLOIT FOR MASSIVE ATTACK TO IOS/MAC IN NETWORK]☆35Updated 6 years ago
- A ctypes powered python keylogger.☆109Updated 5 years ago
- Anubis Malware Samples☆20Updated 3 years ago
- Pentesting Hacking Tools, Scripts, Windows, Linux,☆29Updated 9 years ago
- A simple worm that uses brute force and dictionary attacks through the network to infect vulnerable machines☆29Updated 10 years ago
- Quick utility to craft executables for pentesting and managing reverse shells☆43Updated 6 years ago
- ios hacking stuff☆12Updated 9 years ago
- iSpy Keylogger☆46Updated 8 years ago
- python remote access trojan☆38Updated 8 years ago
- Arduino Rubber Ducky Framework☆107Updated 6 years ago
- Password cracking utility☆53Updated 4 years ago
- ☆40Updated 7 years ago
- Repository dedicated to storing a multitude of iOS/macOS/OSX/watchOS crash bugs. Some samples need to be viewed as raw in order to see th…☆41Updated 6 years ago
- A collection of wireless based bind and reverse connect shells for penetration testers to use in demonstrating persistence to a network v…☆41Updated 10 years ago
- ☆18Updated 7 years ago
- ☆58Updated 5 years ago
- This is a script manipulating a bug in OSX to escalate any user level process to Root privilege.☆22Updated 10 years ago
- Arduino's version of Rubber ducky project watched in mr robot (based on https://www.hak5.org/blog/15-second-password-hack-mr-robot-style)☆34Updated 8 years ago
- MitM pentesting opensource toolkit (scan/sniff/exploit) -- NOT SUPORTED ANYMORE --☆75Updated 8 years ago
- Creating a wireless rifle de-authentication gun, which utilized a yagi antenna and a Raspberry Pi.☆68Updated 10 years ago
- Simple Remote Access Trojan☆24Updated 8 years ago
- Use Invoke-PSImage to deliver a payload in an Image☆53Updated 7 years ago
- An iPhone 7 running below iOS 11 can be hijacked by a nearby hostile WiFi router.☆37Updated 8 years ago
- pinky - The PHP mini RAT (Remote Administration Tool)☆78Updated 7 years ago
- Create one or more monitor-mode virtual wireless interfaces with unique mac addresses.☆12Updated 6 years ago
- Broadpwn bug (CVE-2017-9417)☆52Updated 8 years ago