blackhatethicalhacking / androrat
androrat
☆21Updated 5 years ago
Related projects ⓘ
Alternatives and complementary repositories for androrat
- ☆17Updated 6 years ago
- Keylogger for ethical hackers☆14Updated 3 years ago
- decompiled pegasus_spyware☆13Updated 3 years ago
- Espia trafico de la red NETSPY.sh ( hackingyseguridad.com )☆20Updated 5 months ago
- 🔥Ready, Aim, Fire.🔥☆10Updated 2 years ago
- Combined Worldlist from various projects Including Seclists, fuzzdb and other Database Management Tools☆17Updated 4 years ago
- T.U.F.F. - Targeted Utility for Fast Forensics is mainly used to recon websites and IP addresses for vulnerabilities for an easier pentes…☆11Updated last year
- FrameDomain Framework - subdomains enumeration tool for penetration testers☆28Updated 3 years ago
- BurpDroid is a web application debugging tool for Android and is often used for checking web application security. It’s a proxy-based too…☆9Updated 3 years ago
- A Handy-Dandy Personal Toolkit for Enumeration and a headstart on attacking a machine!☆19Updated 4 years ago
- Get files from Android directories☆11Updated 5 years ago
- Wifi-Confusion is a tool to create to Fake Wifi Acess-Points to Confuse the Victim☆17Updated 3 years ago
- Hacking Tools Z0172CK☆31Updated last year
- An #OSINT Framework to perform various recon techniques on Companies, People, Phone Number, Bitcoin Addresses, etc., aggregate all the r…☆10Updated 5 years ago
- FUD Win32 Keylogger and Reverse Shell (cmd.exe)☆17Updated 2 years ago
- PhishLog is a penetration testing and red teaming tool that automates the setup of a live keylogger that could be used with phishing camp…☆30Updated 5 years ago
- This repo contains tools that hackers use for penetration testing and web hacking, DNS spoofing, MiTM, malware and more. It's made easy j…☆19Updated 3 years ago
- All your layer are belong to us☆19Updated 10 years ago
- A Simple Keylogger with the ability of FTP Transfer and Local Storage☆18Updated 2 months ago
- phishfactory offers a variety of email templates for spear-phishing attacks. [more templates to still be added]☆18Updated 3 years ago
- Eficaz herramienta capaz de inyectar un backdoor a casi cualquier app Android actual☆36Updated 4 years ago
- ☆17Updated 4 years ago
- FEBREV venom is a RAT generator tool to create Android RATs through metasploit , signs the RAT apk , and sends the RAT apk to the victim…☆16Updated 5 years ago
- Mass Social Engineering tool and Email and Account Extraction (Random Brute Force Discovery) and Password Brute Force through Tor.☆21Updated 4 years ago
- Funter (Forms Hunter) is a tool that hunts all forms and inputs found in a list of urls.☆18Updated last year
- serve and destroy aka phisherprice lite is a multi functional pen testing script designed on parrot and kali☆9Updated last year
- A simple script for checking anonymous login as well as bruteforcing ftp accounts.☆10Updated last year
- ☆28Updated 8 years ago