SleepTheGod / iPhone-SSH-BackdoorLinks
This is a shell script that creates an SSH backdoor on an iPhone.
☆224Updated last week
Alternatives and similar repositories for iPhone-SSH-Backdoor
Users that are interested in iPhone-SSH-Backdoor are comparing it to the libraries listed below
Sorting:
- Remote persistent 🔑Logger for Windows and Linux☆294Updated 2 years ago
- This repository contains a few leaked files of HookBot.☆106Updated 2 years ago
- Here are +200 different rats some with source code☆141Updated 2 years ago
- Android malware (.apk) can be spread through a fake PDF document by manipulating the file extension in the WhatsApp application. PoC is a…☆187Updated last year
- Cross Platform Telegram based RAT that communicates via telegram to evade network restrictions☆413Updated 4 months ago
- QuadraInspect is an Android framework that integrates AndroPass, APKUtil, and MobFS, providing a powerful tool for analyzing the security…☆350Updated last year
- Proof-of-concept to demonstrate dynamic QR swap phishing attacks in practice.☆347Updated last year
- Persistent Powershell backdoor tool {😈}☆122Updated last year
- Windows And Ways To Break It☆100Updated 2 years ago
- Automated exploit scanner for cameras on the internet☆215Updated last year
- A Fully Undetectable C2 Server That Communicates Via Google SMTP to evade Antivirus Protections and Network Traffic Restrictions☆477Updated 4 months ago
- A tool to crack WPA2 passphrase with PMKID value without clients or de-authentication☆224Updated 2 years ago
- SeaShell Framework is an iOS post-exploitation framework that enables you to access the device remotely, control it and extract sensitive…☆664Updated last year
- Pwny is an implementation of an advanced payload written in pure C and designed for portability and extensibility.☆91Updated last year
- IoT Camera Reconnaissance and Live Viewer☆169Updated last year
- Limbo is a Python-based malware that collects sensitive data from a user's computer, such as passwords and system information. It is int…☆49Updated last year
- POC | Steal user WhatsApp information/data☆74Updated 8 months ago
- HTML smuggling is a malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachm…☆143Updated 3 years ago
- Phone: A Mobile Phone Forensic Framework ( Android )☆207Updated 9 months ago
- Living Off The Land (LOTL) persistent Reverse shell☆104Updated 2 years ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆14Updated 3 years ago
- CryptChat: Beyond Secure Messaging 🛡️☆71Updated 2 years ago
- PDF dropper Red Team Scenairos☆228Updated last year
- Generate FUD backdoors☆262Updated 2 years ago
- Command & Control-Framework created for collaboration in python3☆320Updated 2 years ago
- mapAccountHijack is a tool designed to carry out a MAP Account hijack attack, which exploits the Message Access Profile (MAP) in Bluetoot…☆64Updated 11 months ago
- Redirect All Traffic Through Tor Network For Kali Linux☆208Updated 9 months ago
- SecretOpt1c is a Red Team tool that helps uncover sensitive information in websites using ACTIVE and PASSIVE Techniques for Superior Accu…☆240Updated last year
- EDR & Antivirus Bypass to Gain Shell Access☆247Updated last year
- A Framework meant for the exploitation of iOS devices.☆225Updated 4 years ago