SleepTheGod / Android-Malware
Android devices using ADB via the Shodan API. It prompts the user for a command payload, then establishes TCP connections to devices with open ADB ports. It retrieves outputs like SSH credentials and IMEI numbers, saves SSH credentials to a file, and handles exceptions gracefully while allowing simultaneous device processing through threading.
☆10Updated 5 months ago
Alternatives and similar repositories for Android-Malware:
Users that are interested in Android-Malware are comparing it to the libraries listed below
- Generate Undetectable Metasploit Payload in a simple way☆37Updated last year
- SubCortex is a fast and efficient tool for passive subdomain enumeration. It aggregates subdomain data from multiple APIs, helping penetr…☆15Updated 4 months ago
- List of RAT's For android. To get any support on them contact t.me/efxtv☆42Updated last month
- Interactive shell to execute commands anonymously using Proxychains and Tor☆36Updated 2 years ago
- Ded Security Framework is a tool aimed at security professionals☆34Updated 9 months ago
- DASH is deep osint Scanner. You just need username to start osint scan.☆48Updated 2 years ago
- This is power full BotNet☆41Updated last year
- This is a exploit with the capability to control ip camera movement even without a username and password.☆53Updated 5 months ago
- A PHP script demonstrating cookie stealing by capturing and logging request information, including the victim's cookie, IP address, HTTP …☆34Updated last year
- crawl a website for links and expose all the vulnerable parameters.☆13Updated 2 years ago
- Generate FUD Ransomeware For Windows, Linux and MAC OS☆23Updated last year
- SADBOT - A simple tool for exploitation on android devices via ADB, users can find vulnerable devices using shodan search.☆38Updated 2 years ago
- Dogma V1.5.3☆30Updated 5 years ago
- Clipboard poisoning attack.☆54Updated 4 years ago
- LulzDDOS TOOL- powerful DDoS toolkit for penetration tests☆19Updated last year
- A Simple Script For SSH BruteForce☆37Updated last year
- Strumenti per Domini - Whois - IP - Data Breach - Email☆14Updated 3 months ago
- An efficient tool To Find click jacking vulnerabilities in easiest way with poc☆20Updated 3 years ago
- Hacking tool for enumeration and automated attacking. Port Scanner, Automatic SSH brute, DNS queries, IP and phonenumber geolocation☆14Updated last year
- Simple script to bulk check if IPs match networks☆12Updated 3 years ago
- AirHunt is a versatile and user-friendly wireless network hacking toolkit designed for security professionals and enthusiasts. With a wid…☆37Updated last year
- 🕵️ Track down social media profiles using a specific username across multiple social network platforms☆41Updated 8 months ago
- This Python script aims to enhance your online privacy and security by automatically rotating your DNS settings at a set interval (defaul…☆12Updated last year
- Generate FUD Droppers that are undetectable by popular AV's☆32Updated last year
- A template-based tool for quickly constructing and running advanced Boolean searches on Google and Twitter/X for person-based OSINT inves…☆13Updated 2 months ago
- Python program Fileless-PE.py generates a Python script (PEloader.py) to load a DLL or EXE file from a given URL. It provides functionali…☆22Updated 7 months ago
- Android Exploit is an advanced version of rat/payload/botnet and can hack an android device in less than 1 minute and can control multipl…☆11Updated 2 years ago
- Who We Are☆19Updated 5 months ago
- G3nius Tools Sploit is a penetration testing tool with a lot of plugins for advanced cybersecurity attacks. User-friendly, Easy and modul…☆57Updated 10 months ago