Prochainezo / iOSbdLinks
Install a Persistent Backdoor on Jailbroken iOS Devices
☆29Updated 10 years ago
Alternatives and similar repositories for iOSbd
Users that are interested in iOSbd are comparing it to the libraries listed below
Sorting:
- ☆19Updated 7 years ago
- A ctypes powered python keylogger.☆107Updated 6 years ago
- A Modular Web Vulnerability Scanner☆51Updated 15 years ago
- Quick utility to craft executables for pentesting and managing reverse shells☆44Updated 6 years ago
- Creating a wireless rifle de-authentication gun, which utilized a yagi antenna and a Raspberry Pi.☆68Updated 10 years ago
- ios hacking stuff☆12Updated 9 years ago
- A collection of wireless based bind and reverse connect shells for penetration testers to use in demonstrating persistence to a network v…☆41Updated 10 years ago
- ☆40Updated 7 years ago
- IOS/MAC Denial-Of-Service [POC/EXPLOIT FOR MASSIVE ATTACK TO IOS/MAC IN NETWORK]☆34Updated 7 years ago
- ☆58Updated 5 years ago
- ☆18Updated 7 years ago
- Anubis Malware Samples☆20Updated 4 years ago
- PoC Android smart phone botnet☆79Updated 13 years ago
- A PHP Based Tool That Helps You To Manage All Your Backdoored Websites Efficiently.☆126Updated 2 years ago
- Broadpwn bug (CVE-2017-9417)☆51Updated 8 years ago
- An iPhone 7 running below iOS 11 can be hijacked by a nearby hostile WiFi router.☆38Updated 8 years ago
- Exploit the hack for IOS 11.1.2 and earlier to collect leaked information.☆86Updated 8 years ago
- Simple (but working) WEP/WPA/WPA2 Hacking script☆29Updated 9 years ago
- A Cross-Platform Forensic Framework for Google Chrome☆71Updated 10 years ago
- Create one or more monitor-mode virtual wireless interfaces with unique mac addresses.☆12Updated 7 years ago
- Phishing webapp generator☆42Updated 7 years ago
- Full nodejs Remote Administration Tools with socket.io☆30Updated 8 years ago
- Attacking WPA/WPA encrypted access point without client.☆51Updated 12 years ago
- Recursive Credit Card Searcher For Windows C++ and Linux☆12Updated 4 years ago
- Forced Man-In-The-Middle HTTPs-Avoiding Reverse Proxy☆62Updated 6 years ago
- Arduino's version of Rubber ducky project watched in mr robot (based on https://www.hak5.org/blog/15-second-password-hack-mr-robot-style)☆34Updated 8 years ago
- Graphical user interface for the windows version of THC Hydra☆55Updated 8 years ago
- WAF Exploitation Framework☆13Updated 2 years ago
- Modules created by Nettitude for Metasploit☆12Updated 7 years ago
- Python script based on aireplay-ng to keep deauthenticating the specified stations from your WiFi network.☆50Updated 9 years ago