dana-at-cp / backdoor-apkView external linksLinks
backdoor-apk is a shell script that simplifies the process of adding a backdoor to any Android APK file. Users of this shell script should have working knowledge of Linux, Bash, Metasploit, Apktool, the Android SDK, smali, etc. This shell script is provided as-is without warranty of any kind and is intended for educational purposes only.
☆2,337Sep 12, 2022Updated 3 years ago
Alternatives and similar repositories for backdoor-apk
Users that are interested in backdoor-apk are comparing it to the libraries listed below
Sorting:
- Python script to inject existing Android applications with a Meterpreter payload.☆644Jul 21, 2023Updated 2 years ago
- Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and et…☆10,997Mar 17, 2024Updated last year
- Undetectable Windows Payload Generation☆1,608Nov 8, 2022Updated 3 years ago
- Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) C2 and post-exploitation framework written in python and C☆8,940Mar 22, 2024Updated last year
- Android Remote Administration Tool☆5,063Aug 12, 2021Updated 4 years ago
- transform your payload.exe into one fake word doc (.ppt)☆468Dec 8, 2019Updated 6 years ago
- A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks☆1,438Nov 3, 2018Updated 7 years ago
- AntiVirus Evasion Tool☆1,740Apr 23, 2025Updated 9 months ago
- Chromebackdoor is a PoC of pentest tool, this tool use a MITB technique for generate a windows executable ".exe" after launch run a malic…☆511Jan 8, 2017Updated 9 years ago
- Patch PE, ELF, Mach-O binaries with shellcode new version in development, available only to sponsors☆3,434Oct 30, 2023Updated 2 years ago
- ☆1,066Jan 13, 2023Updated 3 years ago
- A Ruby framework designed to aid in the penetration testing of WordPress systems.☆1,044Nov 24, 2019Updated 6 years ago
- powerful auto-backdooring utility☆749Dec 20, 2017Updated 8 years ago
- Python Remote Administration Tool (RAT)☆3,525Jan 4, 2024Updated 2 years ago
- Exploit toolkit CVE-2017-0199 - v4.0 is a handy python script which provides pentesters and security researchers a quick and effective wa…☆728Nov 19, 2017Updated 8 years ago
- DEPRECATED, wifipumpkin3 -> https://github.com/P0cL4bs/wifipumpkin3☆3,148Apr 18, 2020Updated 5 years ago
- HERCULES is a special payload generator that can bypass antivirus softwares.☆600Jul 18, 2021Updated 4 years ago
- iOS/macOS/Linux Remote Administration Tool☆1,740Mar 25, 2021Updated 4 years ago
- An automated script that download potential exploit for linux kernel from exploitdb, and compile them automatically☆496Sep 21, 2021Updated 4 years ago
- 📡 A python program to create a fake AP and sniff data.☆1,691Nov 3, 2019Updated 6 years ago
- A post-exploitation powershell tool for extracting juicy info from memory.☆1,865Jun 28, 2024Updated last year
- Empire is a PowerShell and Python post-exploitation agent.☆7,806Jan 19, 2020Updated 6 years ago
- Framework for Man-In-The-Middle attacks☆3,637Aug 28, 2018Updated 7 years ago
- NetRipper - Smart traffic sniffing for penetration testers☆1,384Jun 17, 2022Updated 3 years ago
- Fast and easy create backdoor office exploitation using module metasploit packet , Microsoft Office , Open Office , Macro attack , Buffer…☆442Jul 11, 2017Updated 8 years ago
- Exploits and Security Tools Framework 2.0.1☆307Sep 18, 2022Updated 3 years ago
- Remote administration service which uses twitter as a command and control server☆721Feb 25, 2021Updated 4 years ago
- Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's po…☆3,899Jan 24, 2024Updated 2 years ago
- Embed a Metasploit Payload in an Original .Apk File☆119Mar 25, 2021Updated 4 years ago
- PowerShell Runspace Post Exploitation Toolkit☆1,547Aug 2, 2019Updated 6 years ago
- Python botnet and backdoor☆1,608Mar 2, 2023Updated 2 years ago
- BrowserExploit is an advanced browser exploit pack for doing internal and external pentesting, helping gaining access to internal compute…☆333Apr 19, 2017Updated 8 years ago
- Quickly analyze and reverse engineer Android packages☆835Dec 21, 2022Updated 3 years ago
- Use a Fake image.jpg to exploit targets (hide known file extensions)☆934May 28, 2025Updated 8 months ago
- Miscellaneous exploit code☆1,567Oct 6, 2023Updated 2 years ago
- BrowserBackdoor is an Electron Application with a JavaScript WebSocket Backdoor and a Ruby Command-Line Listener☆343Aug 14, 2022Updated 3 years ago
- A PoC backdoor that uses Gmail as a C&C server☆1,347Nov 16, 2018Updated 7 years ago
- Veil Evasion is no longer supported, use Veil 3.0!☆1,843Sep 24, 2021Updated 4 years ago
- Exploitation Framework for Embedded Devices☆12,968Jun 10, 2025Updated 8 months ago