Android Crypter/Decrypter App Generator
☆51Dec 12, 2018Updated 7 years ago
Alternatives and similar repositories for crydroid
Users that are interested in crydroid are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- WH-ApkCrypter-V2 100% bypass 2020☆41Oct 4, 2023Updated 2 years ago
- ☆15Jun 29, 2020Updated 5 years ago
- ☆10Jan 30, 2022Updated 4 years ago
- Converts C programs that only use syscalls to 64 bit assembly file.☆12Mar 7, 2021Updated 5 years ago
- This repo contain Android malware samples and analysis☆13Apr 3, 2021Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Some of the techniques used in Malware Windows - Persistence(Registry HKCU,startup),Disable Windows Firewall,Disable Windows Defender☆24Nov 20, 2022Updated 3 years ago
- Burp extension that performs a passive scan to identify cloud buckets and then test them for publicly accessible vulnerabilities☆14Jan 17, 2023Updated 3 years ago
- Remote Code Execution vulnerability on ArcSight Logger☆20Jan 24, 2021Updated 5 years ago
- qiling framework examples☆16Jan 17, 2022Updated 4 years ago
- A Conky For parrot Os☆10Dec 3, 2018Updated 7 years ago
- A steganography based shellcode hider to bypass AV☆17Aug 7, 2022Updated 3 years ago
- WH-ApkCrypter any linux + android termux | 100% google play bypass☆27May 7, 2020Updated 5 years ago
- A Docker container used to easily compile Nim binaries generated by my tools (NimPackt and NimPlant)☆16Aug 31, 2023Updated 2 years ago
- A generic IOT framework, open for all user node-red devices and for any advanced custom logic, with some unique features: rich in interfa…☆25Oct 27, 2024Updated last year
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- 0day-today-archive: Historical collection of exploits and vulnerabilities from 0day.today☆35Sep 22, 2025Updated 7 months ago
- Sources code extracted from malwares for analysis☆40Mar 10, 2023Updated 3 years ago
- ☆19Jun 19, 2025Updated 10 months ago
- XploitWebView is a advaced webview android app source code☆33Nov 21, 2019Updated 6 years ago
- Simple extension spoofer that will change your dangerous file (not only) into something like "Presentation-for_schoolexe.pptx", "exeexeex…☆17Jan 23, 2022Updated 4 years ago
- Funter (Forms Hunter) is a tool that hunts all forms and inputs found in a list of urls.☆19Jul 1, 2023Updated 2 years ago
- Crypto Ransomware made with: - Go for encryption and decryption - PHP/MySQL for saving and retrieving keys.☆29Nov 28, 2017Updated 8 years ago
- AndroMW - control your android device without internet☆34Sep 22, 2023Updated 2 years ago
- ☆14Nov 12, 2021Updated 4 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- A Tool For Crypt File And Bypass AntiVirus Even msfvenom Payloads☆21Sep 6, 2019Updated 6 years ago
- Scan a host for open HTTP ports and gain information about the services present.☆12Jul 20, 2022Updated 3 years ago
- ☆29May 1, 2020Updated 5 years ago
- Hax is a mini-tool with really useful hacking tools.☆20May 9, 2023Updated 2 years ago
- Quickly create a list of dorks based on variables entered.☆18Mar 7, 2026Updated last month
- ☆10Oct 8, 2018Updated 7 years ago
- WebPathScanner helps pentester or web developer to find some interesting files( like .htaccess, .htpasswd ..etc) for improving the securi…☆24May 8, 2022Updated 3 years ago
- 🔎 Help find Trojan Source vulnerability in code 👀 . Useful for code review in project with multiple collaborators (CI/CD)☆47Dec 6, 2023Updated 2 years ago
- Python program that denies internet access to a target within a local network...☆22Jun 7, 2021Updated 4 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- A great tool for Distributive Denial of Service attack using our botnet that is completely free.☆11Oct 29, 2019Updated 6 years ago
- A powerful password Brute Force password cracker for pentesting.☆41Feb 24, 2022Updated 4 years ago
- Rizzyscope: Wireless Signal Strength Monitor☆12Aug 30, 2025Updated 8 months ago
- ☆14Jun 22, 2022Updated 3 years ago
- When it comes to exploiting web application security, this is a methodology. Enumeration and Networking guidelines are also listed to hel…☆25Nov 18, 2025Updated 5 months ago
- A tool pulls loaded binaries ordered by memory regions☆35Sep 27, 2019Updated 6 years ago
- #Simple program to track someone by send malicious link☆13May 17, 2020Updated 5 years ago