cheverebe / Android-malwareLinks
Injected malicious code into legitimate andoid applications. Converted a keyboard app into a keylogger and an MP3 downloader into an image thief.
☆19Updated 11 years ago
Alternatives and similar repositories for Android-malware
Users that are interested in Android-malware are comparing it to the libraries listed below
Sorting:
- PoC Android smart phone botnet☆79Updated 13 years ago
- Android Trojan☆197Updated 10 years ago
- Bypassing Android Pattern Lock☆68Updated 11 years ago
- THIS REPO IS OBSOLETE. USE https://github.com/rapid7/metasploit-payloads INSTEAD☆92Updated 2 years ago
- Android Framework for Exploitation, is a framework for exploiting android based devices☆198Updated 10 years ago
- DroidSniff is an Android app for Security analysis in wireless networks and capturing facebook, twitter, linkedin and other accounts.☆172Updated last year
- apk binder script☆60Updated 11 years ago
- Quick script to set up VPN server and reverse VPN for Nethunter☆37Updated 9 years ago
- Android Data Extractor Lite☆130Updated 10 years ago
- This tool creates almost undetectabe trojan virus to exploit windows machine.☆134Updated 8 years ago
- POC for injecting Metasploit payloads on arbitrary APKs☆65Updated 8 years ago
- Android trojan streamer client jar☆15Updated 9 years ago
- Android 802.11 pentesting tool☆95Updated 11 years ago
- ☆10Updated 11 years ago
- Wi-Fi Backdoors☆41Updated 10 years ago
- Script to convert duckyscript files to a format usable by Kali NetHunter's HID attack capabilities.☆11Updated 10 years ago
- cSploit network radar☆31Updated 9 years ago
- This is an updated version of Dendroid with a working panel & APK, I hope that everyone enjoys this download.☆41Updated 11 years ago
- This is a simple modification to the SoftKeyboard sample that is included with the Android SDK. It adds a keylogger that writes output to…☆107Updated 13 years ago
- #Super-dracOS Dracos Linux is an open source operating system provides to penetration testing. Packed with a ton of pentest tools includi…☆36Updated 9 years ago
- The development place of AFFT, a toolkit to automatically acquire and extract data from Android image dumps☆48Updated 9 years ago
- PoC app which takes advantage of Android's SmsReceiverService being exported to fake an incoming SMS with no permissions.☆120Updated 13 years ago
- An android spying application☆37Updated 7 years ago
- Scripts that could be injected in MITM attacks using dSploit☆40Updated 8 years ago
- Automated man-in-the-middle attack tool.☆52Updated 11 years ago
- A Kali Linux Tool to assist with security audits and pentesting. Lots of wrappers for commonly used tools to help extend their usefulness…☆31Updated 12 years ago
- We developed a malware for educational purposes. In particular, our goal is to provide a PoC of what is known as a Repacking attack, a kn…☆99Updated 6 years ago
- A simple worm that uses brute force and dictionary attacks through the network to infect vulnerable machines☆29Updated 10 years ago
- the core of the cSploit project☆35Updated 7 years ago
- A Metasploit payload that will connect to the victim and open up a permanent backdoor to their phone.☆57Updated 9 years ago