☆47Sep 8, 2020Updated 5 years ago
Alternatives and similar repositories for Hacking-Mobile
Users that are interested in Hacking-Mobile are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Repository_Software☆11Aug 26, 2023Updated 2 years ago
- PEN-103-Kali-Linux-Revealed-KLR-Cheat-Sheet☆29Oct 19, 2025Updated 5 months ago
- ADBSploit - A tool for Android device exploitation and management via ADB. Connects via USB/IP, controls apps/media/files, and supports F…☆13Apr 5, 2025Updated last year
- USB accessory with pyusb☆15Mar 31, 2014Updated 12 years ago
- simple script to pwn android phone with physical access☆26Dec 22, 2018Updated 7 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆25Aug 15, 2019Updated 6 years ago
- Ferramenta para criação de payloads HID (human interface device) para android sem nethunter ou rubber ducky☆18Aug 11, 2018Updated 7 years ago
- CHackA_Hacking_Books☆49May 17, 2025Updated 10 months ago
- PoC about CVE-2019-0708 (RDP; Windows 7, Windows Server 2003, Windows Server 2008)☆39May 16, 2019Updated 6 years ago
- This repository contains the code for the book chapter "Near-Field Beamforming and Multiplexing Using Extremely Large Aperture Arrays"☆19Dec 23, 2022Updated 3 years ago
- An easy user interface for pentesting tools☆11Jun 13, 2021Updated 4 years ago
- ☆22Dec 22, 2020Updated 5 years ago
- Guard Cats - scripts to automate certain "hack" tasks on NetHunter☆17Sep 27, 2018Updated 7 years ago
- Browse Android ROMs☆12Dec 5, 2018Updated 7 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Insecure Deserialization, PDF and lab☆18Nov 19, 2019Updated 6 years ago
- Building the application to install on Android devices with Thai mobile numbers and forward incoming SMS to the group of developers/PM on…☆10Jan 6, 2022Updated 4 years ago
- SETUP YOUR TERMUX EASILY BY THIS TOOLS☆35Oct 26, 2024Updated last year
- Termux setup tools☆19Jul 27, 2022Updated 3 years ago
- Control a chromecast with python☆45Feb 27, 2024Updated 2 years ago
- Awesome-Cellular-Hacking☆3,672Mar 21, 2026Updated 3 weeks ago
- ☆12Mar 23, 2026Updated 2 weeks ago
- The first ever JWST morphology catalog (Not a Science Catalog)☆12Mar 23, 2022Updated 4 years ago
- DomainPasswordSpray is a tool written in PowerShell to perform a password spray attack against users of a domain. It will automatically g…☆98Oct 13, 2022Updated 3 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- This is a modified version of the Android libnfc-nci library prepared for the Sony SmartWatch 3 (SWR50).☆12Mar 30, 2015Updated 11 years ago
- Stuff for srsLTE IMSI catcher☆137Jan 11, 2021Updated 5 years ago
- Ladon POC Moudle CVE-2019-11043 (PHP-FPM + Ngnix)☆16Nov 11, 2019Updated 6 years ago
- This is repo with my custom zsh completion files for pentesting tools, which do not exist in zsh and oh-my-zsh by default☆12Oct 23, 2025Updated 5 months ago
- Generates Theos projects based on a template.☆13Dec 2, 2025Updated 4 months ago
- ☆40Mar 12, 2022Updated 4 years ago
- Hunting for Microsoft Exchange the LDAP Way.☆35Oct 30, 2019Updated 6 years ago
- Simplified NAT Slipstream server and client☆22Dec 4, 2020Updated 5 years ago
- Vampire is an aggressor script which integrates with BloodHound to mark nodes as owned.☆79Apr 6, 2021Updated 5 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Generate HID attack strings for Kali Nethunter☆12Mar 20, 2015Updated 11 years ago
- Use powershell to test Office-based persistence methods☆76Apr 17, 2021Updated 4 years ago
- Collection of tips, tools and tutorials around infosec☆29May 18, 2017Updated 8 years ago
- Simple wrapper for meg that sieves through meg's output for you.☆59Oct 25, 2019Updated 6 years ago
- DuckyLogger: DuckyLogger is a Key Logger which captures every key stroke of traget and send them to attacker.☆10Apr 14, 2022Updated 3 years ago
- trakttv everywhere☆27Mar 31, 2013Updated 13 years ago
- Let's you use any Windscribe server over a HTTP proxy. Uses Docker so multiple HTTP proxies at different locations can be created on the …☆12Jan 4, 2019Updated 7 years ago