Script to generate Android App that can hijack autenticated sessions in cookies
☆195Dec 21, 2018Updated 7 years ago
Alternatives and similar repositories for EvilApp
Users that are interested in EvilApp are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Tool to check if an app is installed on the target device through a link☆125Mar 13, 2020Updated 6 years ago
- Script that generates an Android App to hack SMS through WAN☆397Jan 15, 2025Updated last year
- Android Keylogger + Reverse Shell☆462Apr 1, 2022Updated 3 years ago
- Lockphish is a tool for phishing attacks on the lock screen, designed to grab Windows credentials, Android PIN and iPhone Passcode[No lon…☆443Nov 5, 2020Updated 5 years ago
- Powerful Tool to Grab Front Camera Snaps Using A Link☆1,245Mar 19, 2023Updated 3 years ago
- Brute_Force_Attack Gmail Hotmail Twitter Facebook Netflix☆1,710Oct 8, 2021Updated 4 years ago
- discontinued☆527Aug 17, 2023Updated 2 years ago
- Verify if email exists☆411Dec 31, 2021Updated 4 years ago
- Script to generate a Win32 payload that can take images from the WebCam and send it to the attacker☆100Dec 18, 2018Updated 7 years ago
- Chrome Keylogger Extension | Post Exploitation Tool☆440Apr 26, 2022Updated 3 years ago
- Instagram bruteforce exploit module☆817Mar 29, 2024Updated last year
- Simple Remote Access Trojan Tool☆244Feb 18, 2022Updated 4 years ago
- Inject malicious code into *.debs☆285Apr 26, 2022Updated 3 years ago
- ADBSploit - A tool for Android device exploitation and management via ADB. Connects via USB/IP, controls apps/media/files, and supports F…☆13Apr 5, 2025Updated 11 months ago
- Stego is an open-source and free steganography tool that lets you hide your secret message in an image or audio file. You will not notice…☆153Sep 11, 2021Updated 4 years ago
- This tool allows you to perform OSINT and reconnaissance on an organisation or an individual. It allows one to search 1.4 Billion clear t…☆530Dec 13, 2018Updated 7 years ago
- Fake-AP to perform Evil Twin Attack☆144Jul 29, 2018Updated 7 years ago
- ☆52Feb 3, 2024Updated 2 years ago
- Detect evil urls that uses IDN Homograph Attack.☆207Jan 24, 2018Updated 8 years ago
- Advanced MSF Payload Generator tool for Linux☆104Mar 17, 2025Updated last year
- Python wordlist generator☆181Apr 26, 2022Updated 3 years ago
- Wordlist creator written in C to generate all possibilities of passwords☆90Jun 16, 2018Updated 7 years ago
- This tool will setting up your backdoor/rootkits when backdoor already setup it will be hidden your spesisifc process,unlimited your sess…☆751Sep 1, 2022Updated 3 years ago
- Python library for accurately querying username and email usage on online platforms☆1,737Mar 12, 2026Updated last week
- ISeeYou is a Bash and Javascript tool to find the exact location of the users during social engineering or phishing engagements. Using ex…☆1,113Apr 5, 2019Updated 6 years ago
- Websploit is an advanced MITM framework.☆308Nov 11, 2017Updated 8 years ago
- Generate unicode domains for IDN Homograph Attack and detect them.☆1,250Apr 26, 2022Updated 3 years ago
- Image Payload Creating/Injecting tools☆1,291Nov 30, 2023Updated 2 years ago
- AutoRecon is a multi-threaded network reconnaissance tool which performs automated enumeration of services.☆17Oct 27, 2019Updated 6 years ago
- Multiplatform payload dropper☆281Aug 17, 2021Updated 4 years ago
- Ranger Reloaded is a Python script that can be used to scan alive hosts on your network and check for vulnerable open ports.☆30Jan 9, 2023Updated 3 years ago
- Capture WPA handshakes, using besside-ng. Auto upload to http://wpa-sec.stanev.org for cracking the password.☆44Feb 20, 2021Updated 5 years ago
- Android bruteforce tool,,This repository will help you to unlock the Android phone by HID && ADB Attack..☆15Dec 14, 2021Updated 4 years ago
- Hack-camera is a tool used to carry out attacks using social engineering, namely sending a trap link to trap the target and taking photos…☆18Dec 24, 2025Updated 2 months ago
- WiFi Cracking Tool (Using Evil Twin Attack) With Some Modification. (Only For Legal Purposes)☆281May 13, 2018Updated 7 years ago
- Bluetooth Honeypot☆268Jan 2, 2021Updated 5 years ago
- Create Evil Twin network that deauthernticates victims to force them to connect to your evil AP.☆27May 21, 2021Updated 4 years ago
- Python Remote Administration Tool (RAT)☆3,550Jan 4, 2024Updated 2 years ago
- d_5tr☆10Aug 26, 2021Updated 4 years ago