botherder / snoopdroidLinks
(Abandoned) Extract packages from an Android device
☆52Updated 4 years ago
Alternatives and similar repositories for snoopdroid
Users that are interested in snoopdroid are comparing it to the libraries listed below
Sorting:
- Android Connections Forensics☆33Updated 9 years ago
- repo with compromised keys and such☆23Updated 2 years ago
- Forensic data extraction and decoding tool for Android devices☆34Updated 11 years ago
- Simple framework to extract "actionable" data from Android malware (C&Cs, phone numbers etc.)☆108Updated 10 years ago
- Android Data Extractor Lite☆129Updated 10 years ago
- A tool that enumerates Android devices for information useful in understanding its internals and for exploit development. It supports and…☆54Updated 7 years ago
- The development place of AFFT, a toolkit to automatically acquire and extract data from Android image dumps☆47Updated 9 years ago
- ☆94Updated 7 years ago
- Python - Human Interface Device Android Attack Framework☆47Updated 8 years ago
- ☆25Updated 2 years ago
- Framework designed to automate the process of assembly code injection (trojanising) within Android applications.☆44Updated 3 years ago
- [WIP] Anti-Forensics ToolKit to clear post-intrusion sensible logfiles 🔥 (For Research Only)☆14Updated 8 years ago
- lulz: automated webstalking tool☆52Updated 9 years ago
- GUI Tool to generate threat intelligence information in various formats☆44Updated 7 years ago
- bash script to facilitate some aspects of an Android application assessment☆158Updated 4 years ago
- Password cracking utility☆53Updated 4 years ago
- Automated Information Retrieval From APKs For Initial Analysis☆32Updated 8 years ago
- Post-Exploitation Framework☆78Updated 8 years ago
- WiFi HID Injector - An USB Rubberducky / BadUSB On Steroids.☆27Updated 8 years ago
- Silensec's Nyuki Forensics Investigator (Mobile Forensics)☆46Updated 8 years ago
- The iOS Agent for the Needle Security Assessment Framework☆43Updated 8 years ago
- Check All APK's -- scripts for checking your phone for malware☆30Updated 8 years ago
- Tool used for dumping memory from Android devices☆68Updated 10 years ago
- A DFIR tool to extract cryptocoin addresses and other indicators of compromise from binaries.☆56Updated 2 years ago
- Use Tor for anonymous scanning with nmap☆85Updated 10 years ago
- Phishing e-mail repository☆38Updated 5 years ago
- ☆16Updated last year
- Framework for Making Environmental Keyed Payloads☆13Updated 8 years ago
- hemingway is a simple and easy to use spear phishing helper.☆42Updated 8 years ago
- Sends some one a malicious payload through smtp and starts a listener with metasploit.☆35Updated 7 years ago