benniraj25 / crydroidLinks
Android Crypter/Decrypter App Generator
☆50Updated 6 years ago
Alternatives and similar repositories for crydroid
Users that are interested in crydroid are comparing it to the libraries listed below
Sorting:
- An Android spyware which interacts with a remote C&C server to exfiltrate phone data☆75Updated 5 years ago
- Arkhota, a web brute forcer for Android.☆18Updated 2 years ago
- Android Payload obfuscation and icon injection tool☆70Updated last year
- Usage of WH-HackerExploit Hacking - v2 Tool for attacking targets without prior mutual consent is illegal. It's the end user's responsib…☆63Updated 5 years ago
- WH-ApkCrypter-V2 100% bypass 2020☆42Updated 2 years ago
- Network Attack wifi attack vlan attack arp attack Mac Attack Attack revealed etc../☆141Updated 5 years ago
- Apache Tomcat Manager API WAR Shell Upload☆35Updated 5 years ago
- Exfiltrating "google account password" and "android cookies" made easy with evil browser. Checkout YouTube : https://youtu.be/pvuT0m4QUbU☆13Updated 2 years ago
- Fast exploitation based on metasploit.☆74Updated 5 years ago
- (Windows/Linux/Mac) Remote Administration Tool☆68Updated 4 years ago
- Simple program to steal private files from removable storages☆88Updated 3 years ago
- Wi-Fi Exploit Tool☆51Updated 5 years ago
- Just Mod Version of lokiboard with remote reporting via Gmail☆46Updated 5 years ago
- This script can be used to gain access to a victim's Samsung Account if they have a specific version of Samsung Members installed on thei…☆25Updated last year
- This Script Will Detect Canary Token in Microsoft Word Documents☆56Updated 5 years ago
- A simple script to generate a hidden url for social engineering.☆121Updated 5 years ago
- Hacking Tools Z0172CK☆31Updated 2 years ago
- Automated rogue access point setup tool.☆198Updated 4 years ago
- Send anonymous text messages with TOR and the TextBelt API☆68Updated 4 years ago
- ☆15Updated 3 years ago
- Make a Fake wireless access point aka Evil Twin....Easily!!☆72Updated 2 years ago
- Repository of tools used in my blog☆52Updated last year
- Your eyes on the target - SPY☆25Updated 5 years ago
- Find exploits in local and online database☆77Updated last year
- Python Script to Crack Zip Password with Dictionary attack and also use Crunch as Pipeline☆39Updated 7 years ago
- Simple script masks the phishing link under the normal URL☆85Updated 4 years ago
- ☆17Updated 5 years ago
- Embedding executable files in PDF Documents☆46Updated 6 years ago
- A windows post exploitation tool that contains a lot of features for information gathering and more.☆47Updated 4 years ago
- XSS cookie stealer using JavaScript and PHP☆68Updated 6 years ago