androidmalware / iOSDoS
☆53Updated last year
Related projects: ⓘ
- A simple application that will help you determine the usb device. It will be useful when choosing an adapter as it displays the chipset!☆51Updated 11 months ago
- A Framework meant for the exploitation of iOS devices.☆181Updated 3 years ago
- Discord bot to analyze and fetch as much data as possible from ip addresses☆15Updated 6 months ago
- ☆45Updated this week
- You can spam iphone popup messeges using this trick ...☆74Updated 9 months ago
- ☆55Updated this week
- An unofficial clone of Android's NetHunter app for GNU/Linux Operating Systems and Phones. Initially built for PinePhone.☆44Updated last week
- This is a shell script that creates an SSH backdoor on an iPhone.☆208Updated 4 months ago
- Uncover usage of insecure functions, implementation of weak cryptography, encryption status, and the presence of security features like P…☆17Updated 6 months ago
- Pwny is an implementation of an advanced payload written in pure C and designed for portability and extensibility.☆50Updated last month
- A dictionary attack implementation, for the automated cracking of password-protected RAR files with the help of a supplied dictionary fil…☆31Updated 3 years ago
- This tool named "CallSpoof" is mainly used to prank with friends , All working apis are present in the script , If you do any illegal act…☆39Updated 3 months ago
- Android App Pin Security Issue Allowing Unauthorized Payments via Google Wallet☆69Updated 7 months ago
- This is a exploit with the capability to control ip camera movement even without a username and password.☆48Updated 3 weeks ago
- A tool which perform deauthentication attack on unpaired bluetooth devices.☆19Updated 3 weeks ago
- This script makes your BadUSB steal all the victim's Google Chrome password.☆23Updated 2 years ago
- Bluetooth jamming device. long-range version is under testing☆55Updated 2 months ago
- Payloads developed for Hak5 tools such as the BashBunny, USB RubberDucky, and SharkJack. CosmodiumCS has created most of this repository …☆47Updated last year
- This script allows you to create a hidden admin account on your victim's PC.☆30Updated 2 years ago
- Android program to change the IMEI identifiers of slots on the phone under the ARM architecture☆55Updated 7 months ago
- BTSM (Behind-the-Scenes Manipulation) Payloads PoC☆28Updated 6 months ago
- Python Exploitation is a collection of special tools for providing high quality penetration testing using pure python programming languag…☆44Updated last month
- An open-source ESP8266_Deauther with customizable Evil Twin attack, and WiFi signal strength checker, with a user-friendly web interface …☆55Updated 3 months ago
- Le firmware leader français parmi ceux du Flipper Zero. Libérez la véritable puissance et la liberté de votre appareil. Découvrez ses cap…☆11Updated 4 months ago
- ☆107Updated last year
- This is a framework used to weaponize any USB Drive☆34Updated last year
- BlueToolkit is an extensible Bluetooth Classic vulnerability testing framework that helps uncover new and old vulnerabilities in Bluetoo…☆306Updated last month
- A windows Wifi Brute forcing utility which is an extremely old method but still works without the requirement of external dependencies.☆65Updated 2 months ago
- ☆28Updated last week
- This script allows you to take control of a PC with a reverseShell attack.☆44Updated 2 years ago