SleepTheGod / iPhone-SSH-BackdoorLinks
This is a shell script that creates an SSH backdoor on an iPhone.
☆225Updated last year
Alternatives and similar repositories for iPhone-SSH-Backdoor
Users that are interested in iPhone-SSH-Backdoor are comparing it to the libraries listed below
Sorting:
- This repository contains a few leaked files of HookBot.☆106Updated 2 years ago
- Here are +200 different rats some with source code☆126Updated 2 years ago
- Automated exploit scanner for cameras on the internet☆208Updated last year
- Remote persistent 🔑Logger for Windows and Linux☆296Updated 2 years ago
- Limbo is a Python-based malware that collects sensitive data from a user's computer, such as passwords and system information. It is int…☆49Updated last year
- Persistent Powershell backdoor tool {😈}☆122Updated last year
- Proof-of-concept to demonstrate dynamic QR swap phishing attacks in practice.☆341Updated last year
- Windows And Ways To Break It☆101Updated 2 years ago
- Android malware (.apk) can be spread through a fake PDF document by manipulating the file extension in the WhatsApp application. PoC is a…☆187Updated last year
- IoT Camera Reconnaissance and Live Viewer☆167Updated last year
- OpenSSH 9.1 vulnerability mass scan and exploit☆106Updated 2 years ago
- POC | Steal user WhatsApp information/data☆73Updated 6 months ago
- Exfiltrate sensitive user data from apps on Android 12 and 13 using CVE-2024-0044 vulnerability remotely☆74Updated last year
- A tool to crack WPA2 passphrase with PMKID value without clients or de-authentication☆226Updated 2 years ago
- Living Off The Land (LOTL) persistent Reverse shell☆104Updated last year
- Hacking and Cyber Security Ebooks | For More Visit -☆85Updated 6 years ago
- NetworkAssessment: Network Compromise Assessment Tool☆94Updated last year
- Search & Parse Password Leaks☆409Updated last year
- SecretOpt1c is a Red Team tool that helps uncover sensitive information in websites using ACTIVE and PASSIVE Techniques for Superior Accu…☆241Updated last year
- This Python script checks for the CVE-2024-6387 vulnerability in OpenSSH servers. It supports multiple IP addresses, URLs, CIDR ranges, a…☆98Updated last year
- A Fully Undetectable C2 Server That Communicates Via Google SMTP to evade Antivirus Protections and Network Traffic Restrictions☆480Updated 2 months ago
- PoC for a SMS-based shell. Send commands and receive responses over SMS from mobile broadband capable computers☆372Updated 2 years ago
- it is malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web pag…☆119Updated 2 years ago
- HTML smuggling is a malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachm…☆142Updated 3 years ago
- A Sophisticated, Automated, AI-Driven, State-Sponsored Cyber-Espionage/Counter-Espionage & Zero Click AI-Gen Supply Chain Attack Framewor…☆59Updated 7 months ago
- This vulnerability allows an attacker to bypass the credentials brute-force prevention mechanism of the Embedded Web Server (interface) o…☆90Updated last year
- QuadraInspect is an Android framework that integrates AndroPass, APKUtil, and MobFS, providing a powerful tool for analyzing the security…☆350Updated last year
- VICIdial Unauthenticated SQLi to RCE Exploit (CVE-2024-8503 and CVE-2024-8504)☆41Updated last year
- SeaShell Framework is an iOS post-exploitation framework that enables you to access the device remotely, control it and extract sensitive…☆656Updated last year
- Generate an undetectable PE ( .exe ), which bypasses windows defender / AV☆126Updated 6 months ago