Script to generate Android App that can hijack autenticated sessions in cookies
☆200Dec 21, 2018Updated 7 years ago
Alternatives and similar repositories for EvilApp
Users that are interested in EvilApp are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Tool to check if an app is installed on the target device through a link☆130Mar 13, 2020Updated 6 years ago
- Script that generates an Android App to hack SMS through WAN☆408Jan 15, 2025Updated last year
- Android Keylogger + Reverse Shell☆478Apr 1, 2022Updated 4 years ago
- Lockphish is a tool for phishing attacks on the lock screen, designed to grab Windows credentials, Android PIN and iPhone Passcode[No lon…☆455Nov 5, 2020Updated 5 years ago
- Powerful Tool to Grab Front Camera Snaps Using A Link☆1,260Mar 19, 2023Updated 3 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Brute_Force_Attack Gmail Hotmail Twitter Facebook Netflix☆1,748Oct 8, 2021Updated 4 years ago
- discontinued☆525Aug 17, 2023Updated 2 years ago
- Verify if email exists☆415Dec 31, 2021Updated 4 years ago
- Script to generate a Win32 payload that can take images from the WebCam and send it to the attacker☆103Dec 18, 2018Updated 7 years ago
- Chrome Keylogger Extension | Post Exploitation Tool☆442Apr 26, 2022Updated 4 years ago
- Instagram bruteforce exploit module☆817Mar 29, 2024Updated 2 years ago
- Simple Remote Access Trojan Tool☆265Feb 18, 2022Updated 4 years ago
- This tool allows you to perform OSINT and reconnaissance on an organisation or an individual. It allows one to search 1.4 Billion clear t…☆539Dec 13, 2018Updated 7 years ago
- Fake-AP to perform Evil Twin Attack☆147Jul 29, 2018Updated 7 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆52Feb 3, 2024Updated 2 years ago
- Fast SSH Scan and BruteForcer for most common credentials.☆98Jun 15, 2018Updated 7 years ago
- Detect evil urls that uses IDN Homograph Attack.☆208Jan 24, 2018Updated 8 years ago
- Advanced MSF Payload Generator tool for Linux☆105Mar 17, 2025Updated last year
- Python wordlist generator☆182Apr 26, 2022Updated 4 years ago
- Wordlist creator written in C to generate all possibilities of passwords☆93Jun 16, 2018Updated 7 years ago
- Web hacking framework with tools, exploits by python☆402Dec 8, 2022Updated 3 years ago
- This tool will setting up your backdoor/rootkits when backdoor already setup it will be hidden your spesisifc process,unlimited your sess…☆751Sep 1, 2022Updated 3 years ago
- Python library for accurately querying username and email usage on online platforms☆1,752Mar 30, 2026Updated last month
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Websploit is an advanced MITM framework.☆316Nov 11, 2017Updated 8 years ago
- Hijack services that relies on QR Code Authentication.☆275Dec 20, 2023Updated 2 years ago
- Generate unicode domains for IDN Homograph Attack and detect them.☆1,258Apr 26, 2022Updated 4 years ago
- [ Automated Web Vulnerability Scanner ]☆74Jul 12, 2020Updated 5 years ago
- Image Payload Creating/Injecting tools☆1,292Nov 30, 2023Updated 2 years ago
- AutoRecon is a multi-threaded network reconnaissance tool which performs automated enumeration of services.☆18Oct 27, 2019Updated 6 years ago
- Multiplatform payload dropper☆279Aug 17, 2021Updated 4 years ago
- Ranger Reloaded is a Python script that can be used to scan alive hosts on your network and check for vulnerable open ports.☆30Jan 9, 2023Updated 3 years ago
- ☆718Sep 10, 2024Updated last year
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Capture WPA handshakes, using besside-ng. Auto upload to http://wpa-sec.stanev.org for cracking the password.☆44Feb 20, 2021Updated 5 years ago
- Android bruteforce tool,,This repository will help you to unlock the Android phone by HID && ADB Attack..☆15Dec 14, 2021Updated 4 years ago
- Hack-camera is a tool used to carry out attacks using social engineering, namely sending a trap link to trap the target and taking photos…☆19Dec 24, 2025Updated 4 months ago
- rang3r | Multi Thread IP + Port Scanner☆129Oct 28, 2023Updated 2 years ago
- WiFi Cracking Tool (Using Evil Twin Attack) With Some Modification. (Only For Legal Purposes)☆284May 13, 2018Updated 7 years ago
- Bluetooth Honeypot☆267Apr 2, 2026Updated last month
- Create Evil Twin network that deauthernticates victims to force them to connect to your evil AP.☆27May 21, 2021Updated 4 years ago