benniraj25 / crydroidLinks
Android Crypter/Decrypter App Generator
☆50Updated 7 years ago
Alternatives and similar repositories for crydroid
Users that are interested in crydroid are comparing it to the libraries listed below
Sorting:
- An Android spyware which interacts with a remote C&C server to exfiltrate phone data☆76Updated 5 years ago
- Arkhota, a web brute forcer for Android.☆19Updated 2 years ago
- Android Payload obfuscation and icon injection tool☆71Updated 2 years ago
- WH-ApkCrypter-V2 100% bypass 2020☆42Updated 2 years ago
- Network Attack wifi attack vlan attack arp attack Mac Attack Attack revealed etc../☆141Updated 5 years ago
- Make a Fake wireless access point aka Evil Twin....Easily!!☆71Updated 2 years ago
- Exfiltrating "google account password" and "android cookies" made easy with evil browser. Checkout YouTube : https://youtu.be/pvuT0m4QUbU☆13Updated 2 years ago
- Just Mod Version of lokiboard with remote reporting via Gmail☆46Updated 5 years ago
- Your eyes on the target - SPY☆25Updated 5 years ago
- Embedding executable files in PDF Documents☆47Updated 6 years ago
- Usage of WH-HackerExploit Hacking - v2 Tool for attacking targets without prior mutual consent is illegal. It's the end user's responsib…☆64Updated 5 years ago
- this FUD Payload☆39Updated 4 years ago
- Fast exploitation based on metasploit.☆74Updated 6 years ago
- Windows Hacking FrameWork using Reverse Shell☆107Updated 10 months ago
- (Windows/Linux/Mac) Remote Administration Tool☆66Updated 4 years ago
- Wi-Fi Exploit Tool☆51Updated 5 years ago
- Wifi-Confusion is a tool to create to Fake Wifi Acess-Points to Confuse the Victim☆16Updated 5 years ago
- Undetectable helps you to generate fully undetectable payload of metasploit which can bypass android antivirus.☆110Updated 2 years ago
- Simple script masks the phishing link under the normal URL☆86Updated 4 years ago
- DOWNLOAD DROIDJACK CRACKED VERSION 4.4 FOR FREE.......☆42Updated 2 years ago
- remote administrator framework☆22Updated last year
- Easy to understand back door written in python☆36Updated 3 years ago
- 👨🏻💻 A great tool for Ethical Hackers, a malware programmed with Backdoor and Keylogger.☆42Updated 5 years ago
- A windows post exploitation tool that contains a lot of features for information gathering and more.☆46Updated 4 years ago
- Simple program to steal private files from removable storages☆86Updated 3 years ago
- Super Simple Python Word List Generator for Fuzzing and Brute Forcing in Python☆55Updated 5 years ago
- Apache Tomcat Manager API WAR Shell Upload☆34Updated 5 years ago
- Fully Undetectable telegram Rat dropper☆35Updated 5 years ago
- This script can be used to gain access to a victim's Samsung Account if they have a specific version of Samsung Members installed on thei…☆26Updated last year
- Using this Apk-Binder tool or script you can embed the metasploit payload or backdoor with apk files.☆83Updated 5 years ago