Prochainezo / iOSbd
Install a Persistent Backdoor on Jailbroken iOS Devices
☆28Updated 9 years ago
Alternatives and similar repositories for iOSbd:
Users that are interested in iOSbd are comparing it to the libraries listed below
- PoC Android smart phone botnet☆78Updated 12 years ago
- A collection of wireless based bind and reverse connect shells for penetration testers to use in demonstrating persistence to a network v…☆39Updated 9 years ago
- A ctypes powered python keylogger.☆106Updated 5 years ago
- A simple worm that uses brute force and dictionary attacks through the network to infect vulnerable machines☆29Updated 9 years ago
- apk binder script☆60Updated 11 years ago
- USB-Rubber-Ducky Payload - Mimikatz in Memory w UAC Bypass☆35Updated 9 years ago
- Transferring Backdoor Payload by BSSID and Wireless traffic☆57Updated last year
- ☆57Updated 5 years ago
- Arduino's version of Rubber ducky project watched in mr robot (based on https://www.hak5.org/blog/15-second-password-hack-mr-robot-style)☆34Updated 7 years ago
- I havent found a reasonable version of the BlackHole exploit kit without the ionCube annoyances; so here is a fix for that problem :) Pl…☆27Updated 8 years ago
- Repository dedicated to storing a multitude of iOS/macOS/OSX/watchOS crash bugs. Some samples need to be viewed as raw in order to see th…☆40Updated 6 years ago
- HTTP botnet☆61Updated 8 years ago
- Phishing webapp generator☆41Updated 6 years ago
- iSpy Keylogger☆42Updated 8 years ago
- Anubis Malware Samples☆19Updated 3 years ago
- Password cracking utility☆53Updated 4 years ago
- Excalibur is an Eternalblue exploit payload based "Powershell" for the Bashbunny project.☆134Updated 5 years ago
- An iPhone 7 running below iOS 11 can be hijacked by a nearby hostile WiFi router.☆37Updated 7 years ago
- Some wordpress user enumeration scripts.☆39Updated 8 years ago
- Forced Man-In-The-Middle HTTPs-Avoiding Reverse Proxy☆62Updated 5 years ago
- Social Engineering: Simple way to make a fake file for Backdoors☆25Updated last year
- Capstone: Keylogger Trojan☆35Updated 6 years ago
- some python3 functions to add spreading features to any python backdoor☆53Updated 8 years ago
- Red Login: SSH Brute-force Tools☆103Updated 6 years ago
- Use Invoke-PSImage to deliver a payload in an Image☆52Updated 7 years ago
- Automatically get internetz from access points that have MAC based filtering enabled☆55Updated 7 years ago
- Creating a wireless rifle de-authentication gun, which utilized a yagi antenna and a Raspberry Pi.☆68Updated 9 years ago
- A python tool that will extract exif data from picture with two methods☆37Updated 3 years ago
- ☆18Updated 7 years ago
- SSL man-in-the-middle tool targeting iOS devices < 4.3.5☆37Updated 13 years ago