SleepTheGod / Android_Backdoor
SSH Backdoor for android
☆12Updated 5 months ago
Alternatives and similar repositories for Android_Backdoor:
Users that are interested in Android_Backdoor are comparing it to the libraries listed below
- ☆13Updated 2 weeks ago
- ☆14Updated last year
- PowerSploit - A PowerShell Post-Exploitation Framework☆23Updated 2 years ago
- Automatic Mass Tool for check and exploiting vulnerability in CVE-2023-3076 - MStore API < 3.9.9 - Unauthenticated Privilege Escalation (…☆17Updated last year
- There were no proper POCs for CVE-2023-30533 so I made one. (Reported by Vsevolod Kokorin)☆9Updated last year
- Python-based web scraper for a darkweb marketplace on the Tor network.☆27Updated 6 months ago
- Android devices using ADB via the Shodan API. It prompts the user for a command payload, then establishes TCP connections to devices with…☆10Updated 3 weeks ago
- my mini collection of exploits and scripts for pentest☆11Updated 2 years ago
- ☆14Updated 2 years ago
- ☆13Updated last year
- Brute forcing login pages with SQL Injection queries with cURL☆17Updated 2 years ago
- Strumenti per Domini - Whois - IP - Data Breach - Email☆15Updated 5 months ago
- A server side template injection vulnerability in CrushFTP in all versions before 10.7.1 and 11.1.0 on all platforms allows unauthenticat…☆8Updated 10 months ago
- "Ghost (RAT)" -> Reverse shell and management console for Windows☆16Updated 2 years ago
- Tool for bypassing logins vulnerable against SQL injection☆45Updated 11 months ago
- NetFuzzer is a comprehensive network security assessment tool for internal and external network components, including Host Machines, Fire…☆14Updated 2 months ago
- Collection of (4000+) malicious rMQR Codes for Penetration testing, Vulnerability assessments, Red Team operations, Bug Bounty and more☆40Updated 4 months ago
- ☆10Updated 4 months ago
- Generate Undetectable Metasploit Payload in a simple way☆38Updated last year
- ☆17Updated 2 years ago
- Enumeration & fingerprint tool☆24Updated last year
- Terminal based fake identity generator.☆26Updated last year
- xdebug 2.5.5 RCE exploit☆30Updated 2 months ago
- A PHP script demonstrating cookie stealing by capturing and logging request information, including the victim's cookie, IP address, HTTP …☆35Updated last year
- Google Dorking Payloads☆11Updated 9 months ago
- JoomSploit is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's critical…☆26Updated last year
- Cryptanalysis of the DAO exploit & Multi-Stage Attack☆18Updated last year
- WebDirScan is a tool for brute-forcing URIs (directories and files) on web servers by taking input directory to scan for files & director…☆12Updated 2 years ago
- This project explores secure remote access using Metasploit's reverse TCP payloads. Ethically and responsibly, we showcase potential risk…☆29Updated last year
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆12Updated 2 years ago