This project provides a web interface to send a payload via SMS, display device information upon successful delivery, and control the device using various commands.
☆19Feb 20, 2026Updated last month
Alternatives and similar repositories for iOS-Zero-Click-Exploit-Deployment-C2
Users that are interested in iOS-Zero-Click-Exploit-Deployment-C2 are comparing it to the libraries listed below
Sorting:
- Bullet-proof your custom GPT system prompt security with KEVLAR, the ultimate prompt protector against rules extraction, prompt injection…☆20Apr 12, 2024Updated last year
- Complete Malware Index - Use at your own Risk!☆19Sep 2, 2024Updated last year
- A state-sponsored APT framework for cyber/counter-espionage featuring AI-driven zero-click supply chain attacks, autonomous exploit deplo…☆83Mar 3, 2026Updated 2 weeks ago
- ☆26Feb 13, 2026Updated last month
- ☆73Oct 22, 2023Updated 2 years ago
- Defense Intelligence Agency's Special Access Program For Cyber Intelligence, A National Security Asset | Project Red Sword Deploys an AI-…☆21Feb 11, 2025Updated last year
- Zero dependency Svelte's action to handle click outside event☆16Jun 15, 2025Updated 9 months ago
- 申明:仅供教学演示,禁用非法、未授权等进行钓鱼,后果自负。☆12May 21, 2024Updated last year
- Command-line tool to search for malware samples in various repositories☆13Mar 3, 2022Updated 4 years ago
- LuLu is the free macOS firewall☆12Jun 28, 2022Updated 3 years ago
- A github of possible unboxing tests to run on the jan 9th, 2024 rabbit r1 personal companion☆11May 8, 2024Updated last year
- Crypto Wallet Hunter: A program to find cryptocurrency wallets with balances. Supports BTC, ETH, TRX, and BNB. Features multi-threaded se…☆13Jan 10, 2025Updated last year
- Orchestrate fleets of Claude Code & Claude Computer Use agents across containers, VMs, and physical devices. Live desktop streaming, inte…☆91Mar 11, 2026Updated last week
- ☆11Jan 24, 2025Updated last year
- Learning-Pentesting-With-Python☆18Sep 26, 2018Updated 7 years ago
- Application to automate trading on IG Trading platform #Auto Trading #ML #AI☆11May 12, 2019Updated 6 years ago
- Offensive toolkit and BloodHound graph creator for DPAPI blobs and master key files☆14Jan 10, 2026Updated 2 months ago
- A research project to crawl and analyze Top 1 million domains☆24Feb 7, 2023Updated 3 years ago
- This lab is for **EDUCATIONAL PURPOSES ONLY**. Use it responsibly and only on systems you own or have explicit permission to test. Do not…☆17Feb 20, 2026Updated last month
- A backend system for event logging, real time analisys and decision assistance.☆21Apr 1, 2013Updated 12 years ago
- Divulge Stealer a highly advanced info-stealer that outperforms its predecessor, Umbral-Stealer by Blank-c. This new iteration is a compl…☆16Jan 7, 2025Updated last year
- XXE漏洞检测 Payload大全☆13Apr 28, 2019Updated 6 years ago
- Basic network sec tool for real-time threat detection and C2 communication prevention. Features 70+ detection modules, IOC integration, c…☆17Jun 11, 2024Updated last year
- Using a Telegram Chat to Act as a Command and Control Server with Powershell for Windows☆20Jun 25, 2024Updated last year
- "Kali replacer." It has a large number of hacking tools.☆41Mar 31, 2020Updated 5 years ago
- Raspberry Pi 2+ MouseJack port for SPI connected NRF24 modules.☆22Sep 27, 2016Updated 9 years ago
- Deceiving the Tapo app by impersonating a TP-Link device☆12Dec 11, 2023Updated 2 years ago
- Welcome to WarrenGPT a trading AI & the worlds first opensource AI ML trading AI bot the white paper coming soon goal of WarrenGPT is to…☆13May 2, 2023Updated 2 years ago
- A comprehensive collection of CyberSecurity PDFs. Guides, Research Papers, Education, Information Security, Network Security, Cryptograph…☆97Sep 16, 2024Updated last year
- Simple Imaging. Tactical Triage. Zero Clicks.☆19Oct 31, 2017Updated 8 years ago
- By simply inputting text or public network links with details of vulnerability Payloads, Goby AI 2.0 can intelligently output PoC/EXP, si…☆14Feb 20, 2025Updated last year
- Archive of leaked Equation Group materials☆22Aug 17, 2016Updated 9 years ago
- The state of the art network attack and monitoring framework.☆16Mar 5, 2018Updated 8 years ago
- ☆16Apr 25, 2022Updated 3 years ago
- An AI agent to use Ghidra with any AI.☆24Mar 31, 2025Updated 11 months ago
- Butler 是一个用于自动化服务管理和任务调度的工具项目。☆16Mar 11, 2026Updated last week
- Continued expansion of the hexstrike-ai project 📦 Sincere thanks hexstrike-ai!☆46Sep 8, 2025Updated 6 months ago
- Xss payload for bypassing waf☆18Apr 18, 2020Updated 5 years ago
- 基于实战沉淀下的各种弱口令字典☆15Jun 8, 2020Updated 5 years ago