SleepTheGod / iPhone-SSH-BackdoorLinks
This is a shell script that creates an SSH backdoor on an iPhone.
☆222Updated last year
Alternatives and similar repositories for iPhone-SSH-Backdoor
Users that are interested in iPhone-SSH-Backdoor are comparing it to the libraries listed below
Sorting:
- Automated exploit scanner for cameras on the internet☆206Updated last year
- Here are +200 different rats some with source code☆126Updated 2 years ago
- Persistent Powershell backdoor tool {😈}☆122Updated last year
- CryptChat: Beyond Secure Messaging 🛡️☆71Updated last year
- Limbo is a Python-based malware that collects sensitive data from a user's computer, such as passwords and system information. It is int…☆49Updated last year
- This repository contains a few leaked files of HookBot.☆107Updated 2 years ago
- IoT Camera Reconnaissance and Live Viewer☆164Updated last year
- Remote persistent 🔑Logger for Windows and Linux☆296Updated 2 years ago
- Windows And Ways To Break It☆99Updated 2 years ago
- Proof-of-concept to demonstrate dynamic QR swap phishing attacks in practice.☆336Updated last year
- A tool to crack WPA2 passphrase with PMKID value without clients or de-authentication☆222Updated 2 years ago
- A Sophisticated, Automated, AI-Driven, State-Sponsored Cyber-Espionage/Counter-Espionage & Zero Click AI-Gen Supply Chain Attack Framewor…☆53Updated 6 months ago
- A Fully Undetectable C2 Server That Communicates Via Google SMTP to evade Antivirus Protections and Network Traffic Restrictions☆478Updated last month
- QuadraInspect is an Android framework that integrates AndroPass, APKUtil, and MobFS, providing a powerful tool for analyzing the security…☆350Updated last year
- ☆57Updated 6 years ago
- Cross Platform Telegram based RAT that communicates via telegram to evade network restrictions☆402Updated last month
- OpenSSH 9.1 vulnerability mass scan and exploit☆105Updated 2 years ago
- Redirect All Traffic Through Tor Network For Kali Linux☆202Updated 7 months ago
- Pwny is an implementation of an advanced payload written in pure C and designed for portability and extensibility.☆90Updated 11 months ago
- This demonstration video shows how we can control the victim's device by sending the innocent-looking PDF file to the target which actual…☆65Updated 4 years ago
- Android malware (.apk) can be spread through a fake PDF document by manipulating the file extension in the WhatsApp application. PoC is a…☆186Updated last year
- PoC for a SMS-based shell. Send commands and receive responses over SMS from mobile broadband capable computers☆370Updated 2 years ago
- NetworkAssessment: Network Compromise Assessment Tool☆96Updated last year
- SecretOpt1c is a Red Team tool that helps uncover sensitive information in websites using ACTIVE and PASSIVE Techniques for Superior Accu…☆237Updated last year
- Distribución para OSINT basada en Debian 12 / OSINT Distribution based in Debian 12☆92Updated 5 months ago
- TrafficWatch, a packet sniffer tool, allows you to monitor and analyze network traffic from PCAP files☆119Updated last year
- VICIdial Unauthenticated SQLi to RCE Exploit (CVE-2024-8503 and CVE-2024-8504)☆41Updated last year
- DoSinator is a powerful Denial of Service (DoS) testing tool developed in Python.☆140Updated last year
- POC | Steal user WhatsApp information/data☆73Updated 5 months ago
- A Framework meant for the exploitation of iOS devices.☆221Updated 4 years ago