SleepTheGod / iPhone-SSH-Backdoor
This is a shell script that creates an SSH backdoor on an iPhone.
☆217Updated 4 months ago
Alternatives and similar repositories for iPhone-SSH-Backdoor:
Users that are interested in iPhone-SSH-Backdoor are comparing it to the libraries listed below
- Automated exploit scanner for cameras on the internet☆182Updated 11 months ago
- A Fully Undetectable C2 Server That Communicates Via Google SMTP to evade Antivirus Protections and Network Traffic Restrictions☆470Updated last year
- Proof-of-concept to demonstrate dynamic QR swap phishing attacks in practice.☆278Updated 8 months ago
- This repository contains a few leaked files of HookBot.☆104Updated last year
- Persistent Powershell backdoor tool {😈}☆112Updated 6 months ago
- Windows And Ways To Break It☆100Updated last year
- Here are +200 different rats some with source code☆87Updated last year
- Remote persistent 🔑Logger for Windows and Linux☆299Updated last year
- SecretOpt1c is a Red Team tool that helps uncover sensitive information in websites using ACTIVE and PASSIVE Techniques for Superior Accu…☆224Updated 5 months ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆14Updated 2 years ago
- Distribución para OSINT basada en Debian 12 / OSINT Distribution based in Debian 12☆91Updated last year
- Limbo is a Python-based malware that collects sensitive data from a user's computer, such as passwords and system information. It is int…☆46Updated 10 months ago
- Command & Control-Framework created for collaboration in python3☆314Updated last year
- ☆288Updated last year
- Cross Platform Telegram based RAT that communicates via telegram to evade network restrictions☆355Updated last year
- SeaShell Framework is an iOS post-exploitation framework that enables you to access the device remotely, control it and extract sensitive…☆517Updated 5 months ago
- Bear C2 is a compilation of C2 scripts, payloads, and stagers used in simulated attacks by Russian APT groups, Bear features a variety of…☆327Updated 4 months ago
- Android malware (.apk) can be spread through a fake PDF document by manipulating the file extension in the WhatsApp application. PoC is a…☆148Updated 6 months ago
- OpenSSH 9.1 vulnerability mass scan and exploit☆104Updated last year
- Steal/Inject Chrome cookies over the DevTools (--remote-debugging-port) protocol.☆108Updated last year
- A Framework meant for the exploitation of iOS devices.☆200Updated 3 years ago
- A tool to crack WPA2 passphrase with PMKID value without clients or de-authentication☆207Updated last year
- Search & Parse Password Leaks☆326Updated 4 months ago
- Living Off The Land (LOTL) persistent Reverse shell☆95Updated last year
- Demonized Shell is an Advanced Tool for persistence in linux.☆315Updated last month
- HTML smuggling is a malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachm…☆123Updated 2 years ago
- it is malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web pag…☆124Updated last year
- QuadraInspect is an Android framework that integrates AndroPass, APKUtil, and MobFS, providing a powerful tool for analyzing the security…☆338Updated 7 months ago
- PingRAT secretly passes C2 traffic through firewalls using ICMP payloads.☆407Updated last year
- POC Pdf-exploit builder on C#☆129Updated 11 months ago