The ultimate Metasploit apk binder with legit apk written in python3
☆35Feb 19, 2022Updated 4 years ago
Alternatives and similar repositories for Infector
Users that are interested in Infector are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- An archived project☆21Jan 21, 2022Updated 4 years ago
- 26 COUNTRY CLONING NEW TOOL FOR CLONERS 26 COUNTRY CLONING FROM AUTOMATIC PASSWORDS AND ALSO ADDED OWN PASSWO…☆13Apr 24, 2021Updated 4 years ago
- Reverse engineered OTP Apis.☆101Feb 25, 2024Updated 2 years ago
- Efficient and advanced man in the middle framework☆23May 18, 2020Updated 5 years ago
- Free Udemy Courses Enroller Bot By #BotolBaba. Bot for grab all udemy paid courses with coupons and add them to your udemy account automa…☆14Aug 18, 2021Updated 4 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Install ubuntu 20 in termux with desktop interference . With many advance hacking tools☆19Jul 29, 2021Updated 4 years ago
- Lock your termux and get a welcome meassage!☆12Aug 18, 2021Updated 4 years ago
- ☆11Mar 16, 2026Updated 3 weeks ago
- This tool is great for information gathering and post- exploitation☆16Jul 20, 2021Updated 4 years ago
- A private chat app made using kivy.☆18Jan 8, 2023Updated 3 years ago
- Its a virus tool which destroys pc faster...☆15Sep 27, 2021Updated 4 years ago
- Script to generate an Android App to track location in real time☆20Jan 7, 2019Updated 7 years ago
- Ping2death is a ddos to send packet over a user.. Its has a custom amount of packet☆15Sep 22, 2021Updated 4 years ago
- Facebook Random Number Id Cloning, No Login Need☆29Oct 30, 2022Updated 3 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- List of Issuer Identification Numbers☆15Aug 7, 2013Updated 12 years ago
- Powerful and smart Traffic Anonymizer using tor as a transparent proxy☆34May 24, 2025Updated 10 months ago
- My Nmap without root privileges! For hackers.☆43Jul 30, 2023Updated 2 years ago
- ☆13Apr 9, 2020Updated 6 years ago
- A powerful password Brute Force password cracker for pentesting.☆41Feb 24, 2022Updated 4 years ago
- Rust-based password mutator for brute force attacks☆13Mar 21, 2025Updated last year
- Advanced python HTTP reverse shell made for Hacking Competition purpose. I am not responsible of what you do with this tool.☆24Aug 14, 2023Updated 2 years ago
- Recon Automation☆11Sep 14, 2024Updated last year
- Mass report on telegram accounts based on a given list☆22Mar 15, 2022Updated 4 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- ☆16Dec 22, 2021Updated 4 years ago
- Config files for my GitHub profile.☆10Mar 28, 2022Updated 4 years ago
- Ultimate phishing tool ,A beginners friendly, Automated phishing tool in python. Author is not responsible for any misuse.☆12Mar 28, 2022Updated 4 years ago
- Shodan Monitoring integration for TheHive.☆130Dec 12, 2024Updated last year
- Remote persistent keylogger for Windows and Linux..☆12Aug 21, 2022Updated 3 years ago
- Wake On LAN for PHP☆11Mar 21, 2017Updated 9 years ago
- Quickly create a list of dorks based on variables entered.☆18Mar 7, 2026Updated last month
- This python program gets all the saved passwords, credit cards and bookmarks from chromium based browsers supports chromium 80 and above!☆11Aug 27, 2022Updated 3 years ago
- 🚩 A simple and clean python banner generator - Banners☆15Mar 28, 2022Updated 4 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- ☆69Aug 28, 2020Updated 5 years ago
- The lazy box is developed for setting up a good testing environment for infosec peoples easily. Mostly this box has all the necessary lib…☆15Apr 11, 2022Updated 4 years ago
- Using this Apk-Binder tool or script you can embed the metasploit payload or backdoor with apk files.☆84Apr 27, 2020Updated 5 years ago
- Athenz is a role-based authorization (RBAC) system for provisioning and configuration (centralized authorization) use cases as well as se…☆13Oct 29, 2019Updated 6 years ago
- Store and retrieve your passwords from a secure offline database. Check if your passwords has leaked previously to prevent targeted passw…☆33Mar 4, 2023Updated 3 years ago
- this is the youtube phishing html, use it to grab anyones google account info ! Link : https://pinkythegawd.github.io/youtube-phishing-pa…☆18Oct 10, 2025Updated 6 months ago
- decompiled pegasus_spyware☆46Jul 28, 2021Updated 4 years ago