SleepTheGod / Android_Backdoor
SSH Backdoor for android
☆12Updated 3 months ago
Alternatives and similar repositories for Android_Backdoor:
Users that are interested in Android_Backdoor are comparing it to the libraries listed below
- ☆13Updated last year
- There were no proper POCs for CVE-2023-30533 so I made one. (Reported by Vsevolod Kokorin)☆10Updated last year
- Cryptanalysis of the DAO exploit & Multi-Stage Attack☆21Updated 9 months ago
- Brute forcing login pages with SQL Injection queries with cURL☆17Updated last year
- A PHP script demonstrating cookie stealing by capturing and logging request information, including the victim's cookie, IP address, HTTP …☆34Updated last year
- A PowerShell script that simplifies life and therefore... phishing.☆17Updated 2 years ago
- "Ghost (RAT)" -> Reverse shell and management console for Windows☆16Updated 2 years ago
- Google Dorking Payloads☆10Updated 6 months ago
- A python script to check if URLs are allowed or disallowed by a robots.txt file.☆21Updated 2 years ago
- This project explores secure remote access using Metasploit's reverse TCP payloads. Ethically and responsibly, we showcase potential risk…☆30Updated last year
- WebDirScan is a tool for brute-forcing URIs (directories and files) on web servers by taking input directory to scan for files & director…☆12Updated last year
- F5 BIG-IP Scanner scans for servers on shodan and checks to see if they are vulnerable.☆17Updated last year
- Windows Reverse TCP Shell for Hacking and Pentesting☆23Updated 5 months ago
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆12Updated 2 years ago
- Tool for bypassing logins vulnerable against SQL injection☆45Updated 9 months ago
- Simple Tool for webhacking☆10Updated last year
- PowerSploit - A PowerShell Post-Exploitation Framework☆23Updated 2 years ago
- Collection of (4000+) malicious rMQR Codes for Penetration testing, Vulnerability assessments, Red Team operations, Bug Bounty and more☆39Updated 2 months ago
- xdebug 2.5.5 RCE exploit☆29Updated this week
- Subdomains scanner Spider☆13Updated 10 months ago
- Cyber Security Club, Offensive Operations Section (Red Team) learning pathway.☆28Updated last year
- Receive email alerts on successful ssh logins based on a predefined IP whitelist OR a predefined IP country origin whitelist (using gmail…☆21Updated 6 months ago
- This repository hosts PoC exploits for vulnerabilities I've discovered, provided for education and to highlight the importance of system …☆19Updated last year
- Enumeration & fingerprint tool☆24Updated 10 months ago
- ☆14Updated 2 years ago
- mapAccountHijack is a tool designed to carry out a MAP Account hijack attack, which exploits the Message Access Profile (MAP) in Bluetoot…☆37Updated 3 months ago
- This is a working variant of the Mirai IOT botnet☆13Updated 2 years ago