Android devices using ADB via the Shodan API. It prompts the user for a command payload, then establishes TCP connections to devices with open ADB ports. It retrieves outputs like SSH credentials and IMEI numbers, saves SSH credentials to a file, and handles exceptions gracefully while allowing simultaneous device processing through threading.
☆16Jan 7, 2026Updated 3 months ago
Alternatives and similar repositories for Android-Malware
Users that are interested in Android-Malware are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- How to set up and install Ss7 and Sigtran Adapt☆36May 19, 2024Updated last year
- apk加固实现☆12Oct 17, 2019Updated 6 years ago
- A privilege escalation vulnerability exists in Windows due to a flaw in the implementation of the Atom Table. An attacker could exploit t…☆31Sep 18, 2024Updated last year
- sms bomber in django☆14May 28, 2021Updated 4 years ago
- Python tool to detect critical information (passwords, usernames, strings connectios, etc) in public repositories. GITHUB Hacking.☆22Jan 10, 2022Updated 4 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- A small python script that uses msfvenom to hide a tcp reverse shell to an android device inside an APK file☆14Jul 18, 2020Updated 5 years ago
- ☆14Jan 17, 2026Updated 3 months ago
- all about android reverse engineering☆12Oct 3, 2020Updated 5 years ago
- Synpse is an all-in-one solution to manage your servers and IoT devices providing declarative app deployment, SSH access and TCP tunnels☆21Nov 11, 2025Updated 5 months ago
- This Python script aims to enhance your online privacy and security by automatically rotating your DNS settings at a set interval (defaul…☆36Apr 9, 2026Updated 2 weeks ago
- Source code of the Chaos Ransomware, also known as Ryuk and Yashma.☆17Dec 21, 2024Updated last year
- Read text messages in the android phone inbox.☆13Jun 27, 2021Updated 4 years ago
- FB-HACKER☆13Apr 2, 2023Updated 3 years ago
- ☆16Jan 9, 2025Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Generative AI-based CyberSecurity-focused Prompt Dataset for Benchmarking Large Language Models☆38Jan 14, 2025Updated last year
- Asqlmap is a terminal interface to automatize the famous SQL Injection's tool sqlmap. It provides a very simple interface to quickly perf…☆25May 1, 2022Updated 3 years ago
- Script to download, build, and install the most recent libplist, libusbmuxd, libimobiledevice, libirecovery, idevicerestore, usbmuxd, lib…☆11Feb 16, 2026Updated 2 months ago
- PoC code for stealing the WiFi password of a network with a Lovebox IOT device connected☆14May 12, 2022Updated 3 years ago
- Xposed module fake system information sucu as imei ,location☆13Aug 7, 2016Updated 9 years ago
- 🌟 **Phone Number Details Extractor Code** Uncover phone number mysteries effortlessly! This Python code, powered by phonenumbers, revea…☆16Mar 2, 2024Updated 2 years ago
- Training for Golang (go language)☆10Mar 29, 2019Updated 7 years ago
- A simple web application built with Streamlit that allows users to upload a PDF file and display its pages as images. Users can select a …☆15Jan 4, 2024Updated 2 years ago
- yet another distribution for jailbreaking A7-A11 iOS devices with checkra1n☆16Sep 3, 2024Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Advanced information gathering & OSINT tool for phone numbers.☆13Oct 9, 2020Updated 5 years ago
- A small end-to-end prober and Prometheus stats exporter for a Matrix homeserver☆11Oct 26, 2023Updated 2 years ago
- This tool gives information about the phone number that you entered.☆51Jun 20, 2023Updated 2 years ago
- Bypass iCloud☆13Dec 9, 2023Updated 2 years ago
- A C2 framework inspired by anime, made in python.☆12Feb 8, 2026Updated 2 months ago
- ip-tracker live-location phone-tracker ip-tracker-adress live-location-tracker live-hacking☆21Feb 17, 2024Updated 2 years ago
- Unified repository for different Metasploit Framework payloads☆16Apr 3, 2017Updated 9 years ago
- ☆14May 8, 2018Updated 7 years ago
- A tool to extract local data storage of an Android application in one click.☆20Dec 8, 2018Updated 7 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- A web3 authentication service on IPFS gateway☆20Oct 12, 2024Updated last year
- Cyber Equipment for Carrying out Pentesting and Server Defense from Hacker Attack Activities☆22Oct 16, 2025Updated 6 months ago
- FBI: Facial expression & brainwave signals based emotion recognition and analysis web service☆11Jan 6, 2023Updated 3 years ago
- Solana Copy Trading Bot, This Solana copy trading bot uses gRPC and ShredStream for ultra-low latency. 0 block auto copy trading, frontru…☆21Aug 4, 2025Updated 8 months ago
- Codebase for "Surveilling Surveillance: Estimating the Prevalence of Surveillance Cameras with Street View Data"☆20Jul 15, 2021Updated 4 years ago
- Detecting leaked secrets, API keys, credentials, and sensitive files from public repositories in near real-time using the GitHub Events A…☆33May 1, 2025Updated 11 months ago
- A sample app to show how to receive packets via PCAPdroid☆29Dec 29, 2024Updated last year