benniraj25 / crydroidLinks
Android Crypter/Decrypter App Generator
☆51Updated 6 years ago
Alternatives and similar repositories for crydroid
Users that are interested in crydroid are comparing it to the libraries listed below
Sorting:
- Android Payload obfuscation and icon injection tool☆70Updated last year
- An Android spyware which interacts with a remote C&C server to exfiltrate phone data☆76Updated 5 years ago
- Arkhota, a web brute forcer for Android.☆18Updated 2 years ago
- WH-ApkCrypter-V2 100% bypass 2020☆43Updated last year
- Exfiltrating "google account password" and "android cookies" made easy with evil browser. Checkout YouTube : https://youtu.be/pvuT0m4QUbU☆13Updated 2 years ago
- Network Attack wifi attack vlan attack arp attack Mac Attack Attack revealed etc../☆141Updated 5 years ago
- This script can be used to gain access to a victim's Samsung Account if they have a specific version of Samsung Members installed on thei…☆26Updated last year
- PHP ransomware that encrypts your files, as well as file and directory names.☆114Updated 2 years ago
- Simple program to steal private files from removable storages☆88Updated 3 years ago
- Apache Tomcat Manager API WAR Shell Upload☆35Updated 5 years ago
- Usage of WH-HackerExploit Hacking - v2 Tool for attacking targets without prior mutual consent is illegal. It's the end user's responsib…☆63Updated 5 years ago
- DOWNLOAD DROIDJACK CRACKED VERSION 4.4 FOR FREE.......☆42Updated 2 years ago
- Complete Automated pentest framework for Information Gathering☆43Updated 5 years ago
- Fast exploitation based on metasploit.☆74Updated 5 years ago
- (Windows/Linux/Mac) Remote Administration Tool☆68Updated 4 years ago
- Super Simple Python Word List Generator for Fuzzing and Brute Forcing in Python☆56Updated 4 years ago
- this FUD Payload☆39Updated 4 years ago
- Fully Undetectable telegram Rat dropper☆37Updated 4 years ago
- steal chrome saved passwords "undetectable"☆51Updated 3 years ago
- Wi-Fi Exploit Tool☆53Updated 5 years ago
- Make a Fake wireless access point aka Evil Twin....Easily!!☆72Updated 2 years ago
- Create a fully undetectable backdoor with simple steps.☆76Updated 3 years ago
- Embedding executable files in PDF Documents☆46Updated 6 years ago
- The purpose of this tool is to test the window10 defender protection and also other antivirus protection.☆93Updated 2 years ago
- Your eyes on the target - SPY☆25Updated 5 years ago
- Eficaz herramienta capaz de inyectar un backdoor a casi cualquier app Android actual☆38Updated 4 years ago
- Windows Hacking FrameWork using Reverse Shell☆107Updated 6 months ago
- remote administrator framework☆22Updated last year
- Send anonymous text messages with TOR and the TextBelt API☆68Updated 4 years ago
- !!!WORLD'S 🌍 #1🥇 TOR HACKING SUITE!!! Designed to scan and exploit vulnerabilities within Tor hidden services. Vigilante allows most to…☆48Updated 2 years ago