☆47Sep 8, 2020Updated 5 years ago
Alternatives and similar repositories for Hacking-Mobile
Users that are interested in Hacking-Mobile are comparing it to the libraries listed below
Sorting:
- Repository_Software☆11Aug 26, 2023Updated 2 years ago
- Dark Reader Chrome and Firefox extension☆12Jul 7, 2019Updated 6 years ago
- ADBSploit - A tool for Android device exploitation and management via ADB. Connects via USB/IP, controls apps/media/files, and supports F…☆13Apr 5, 2025Updated 11 months ago
- A lightweight PHP-based SMS to XMPP bi-directional gateway application which receives messages from an SMS gateway device/application and…☆19Jun 22, 2013Updated 12 years ago
- simple script to pwn android phone with physical access☆26Dec 22, 2018Updated 7 years ago
- ☆16Aug 20, 2017Updated 8 years ago
- An easy user interface for pentesting tools☆11Jun 13, 2021Updated 4 years ago
- Guard Cats - scripts to automate certain "hack" tasks on NetHunter☆17Sep 27, 2018Updated 7 years ago
- ☆17Feb 17, 2022Updated 4 years ago
- Browse Android ROMs☆12Dec 5, 2018Updated 7 years ago
- Building the application to install on Android devices with Thai mobile numbers and forward incoming SMS to the group of developers/PM on…☆10Jan 6, 2022Updated 4 years ago
- Solid Wave Simulation (swSim) is software that solves heterogeneous, anisotropic elastodynamic equations for ultrasonic NDE simulation. A…☆15Apr 6, 2021Updated 4 years ago
- ☆10Dec 1, 2022Updated 3 years ago
- Exploit code for CVE-2019-17662☆18Sep 12, 2021Updated 4 years ago
- Control a chromecast with python☆45Feb 27, 2024Updated 2 years ago
- Awesome-Cellular-Hacking☆3,657Updated this week
- The first ever JWST morphology catalog (Not a Science Catalog)☆12Mar 23, 2022Updated 3 years ago
- DomainPasswordSpray is a tool written in PowerShell to perform a password spray attack against users of a domain. It will automatically g…☆98Oct 13, 2022Updated 3 years ago
- Script to install and configure common programs in a new iSH Alpine Linux filesystem☆14Jan 6, 2022Updated 4 years ago
- Constructors for pithy, potty-mouths.☆27Feb 22, 2024Updated 2 years ago
- Test for android usb otg☆21Apr 22, 2014Updated 11 years ago
- Cobalt Strike Field Manual - A quick reference for Windows commands that can be accessed in a beacon console.☆65Dec 27, 2017Updated 8 years ago
- Stuff for srsLTE IMSI catcher☆135Jan 11, 2021Updated 5 years ago
- Getting Started with Docker☆15Oct 30, 2016Updated 9 years ago
- Ladon POC Moudle CVE-2019-11043 (PHP-FPM + Ngnix)☆16Nov 11, 2019Updated 6 years ago
- This is repo with my custom zsh completion files for pentesting tools, which do not exist in zsh and oh-my-zsh by default☆12Oct 23, 2025Updated 4 months ago
- Particles (or stars) flowing smoothly in a Perlin Noise field. Very customizable.☆10Nov 24, 2025Updated 3 months ago
- Generates Theos projects based on a template.☆13Dec 2, 2025Updated 3 months ago
- Hunting for Microsoft Exchange the LDAP Way.☆35Oct 30, 2019Updated 6 years ago
- Hikvision camera backdoor exploit for beef framework (hikvision versions 5.2.0 - 5.3.9)☆20Aug 12, 2020Updated 5 years ago
- ☆14Jun 28, 2022Updated 3 years ago
- Simplified NAT Slipstream server and client☆22Dec 4, 2020Updated 5 years ago
- Samsung kernel sources for the Galaxy Note 5, S6, S6 edge, and S6 edge+☆21Jan 27, 2017Updated 9 years ago
- Generate HID attack strings for Kali Nethunter☆12Mar 20, 2015Updated 11 years ago
- Illustrations of codeql's AST☆12Sep 10, 2021Updated 4 years ago
- Use powershell to test Office-based persistence methods☆76Apr 17, 2021Updated 4 years ago
- Simple wrapper for meg that sieves through meg's output for you.☆59Oct 25, 2019Updated 6 years ago
- Undetectable Windows Payload Generation☆10Dec 2, 2017Updated 8 years ago
- trakttv everywhere☆27Mar 31, 2013Updated 12 years ago