Various analysis of Android stalkerware
☆117Apr 24, 2020Updated 5 years ago
Alternatives and similar repositories for android-stalkerware
Users that are interested in android-stalkerware are comparing it to the libraries listed below
Sorting:
- (Abandoned) Extract packages from an Android device☆53Apr 9, 2021Updated 4 years ago
- Hunting cryptonote-related miners☆23Nov 3, 2020Updated 5 years ago
- Advices to look for malicious software on your devices☆18May 6, 2020Updated 5 years ago
- local trading of BNB and Meme Rush tokens on Binance Smart Chain☆28Feb 25, 2026Updated last week
- ☆25Jun 5, 2023Updated 2 years ago
- TheDorkbox Comprehensive collection of Google Dorks & OSINT techniques to find Confidential Data☆30Dec 27, 2019Updated 6 years ago
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆11Oct 29, 2018Updated 7 years ago
- Tools for hunting security threats☆12Feb 4, 2020Updated 6 years ago
- CTI-URLScan is a command line tool to enable analysts to search URLscan.io submissions. Pull screenshot and DOM content. As well as, auto…☆10Mar 2, 2021Updated 5 years ago
- Tool scan EternalBlue by golang☆21Sep 13, 2019Updated 6 years ago
- A cross-platform stager for SILENTTRINITY (https://github.com/byt3bl33d3r/SILENTTRINITY)☆26Aug 9, 2019Updated 6 years ago
- ISDi (IPV Spyware Discovery) tool for Android and iOS.☆199Nov 6, 2025Updated 3 months ago
- Simple Distributed IOC Scanner☆12Jul 27, 2015Updated 10 years ago
- Add UART and LCD 1602 to HACKRF.☆14Sep 1, 2015Updated 10 years ago
- Take a list of URIs and print all the of the paths☆10Aug 16, 2020Updated 5 years ago
- Documents pertaining to internal policies and guidelines☆12Jan 20, 2017Updated 9 years ago
- python reverse shell with gmail☆16Aug 9, 2024Updated last year
- Multithreaded drupalgeddon2 scanner☆12Apr 21, 2018Updated 7 years ago
- Using CVE-2013-6282 to bypass Samsung kernel module authentication☆13Dec 21, 2013Updated 12 years ago
- Collection of red machine learning projects☆41Aug 16, 2021Updated 4 years ago
- The state of the art, modular, portable and easily extensible MITM framework in a Docker Container.☆14Dec 30, 2017Updated 8 years ago
- ☆12Sep 11, 2014Updated 11 years ago
- ☆12Dec 22, 2021Updated 4 years ago
- Python3 script that can download samples directly from Abuse.CH or via submitted URLs☆15Apr 15, 2020Updated 5 years ago
- Use surrounding WiFi networks to find the geolocation of the device☆19Sep 25, 2018Updated 7 years ago
- A multiplatform spyware with many features.☆13Sep 24, 2021Updated 4 years ago
- Very loud vBulletin exploit☆14Aug 12, 2020Updated 5 years ago
- APT34/OILRIG leak☆11Jun 25, 2019Updated 6 years ago
- pyCryptoCat - A CryptoCat standalone python client.☆35Dec 22, 2013Updated 12 years ago
- Convert Wigle.net result from json to Kml☆15Dec 4, 2020Updated 5 years ago
- Simple keylogger on C++ with several functions.☆16Jun 19, 2020Updated 5 years ago
- A golang CLI to setup honey pots https://en.wikipedia.org/wiki/Honeypot_(computing)☆16Jul 19, 2020Updated 5 years ago
- Generic cracker example which is compatible with Hashtopolis☆23May 18, 2021Updated 4 years ago
- CryptoChecker with bunch of features. Seedphrase checker, Metamask, Brave, Ronin, Binance Chain, Exodus, Atomic wallets. NFT & Airdrops c…☆36May 15, 2025Updated 9 months ago
- Given a string determine the possible hashing algorithms used to produce that string.☆17Nov 23, 2020Updated 5 years ago
- A streamlined way to create STIX documents!☆31Apr 30, 2014Updated 11 years ago
- donLoader is a shellcode loader creation tool that uses donut to convert executable payloads into shellcode to evade detection on disk.☆20Nov 24, 2021Updated 4 years ago
- Example Android app project using the SeriesGuide extension API and view intents.☆21May 8, 2025Updated 9 months ago
- SAFETAG is a curricula, a methodology, and a framework for security auditors working with advocacy groups.☆82Feb 11, 2026Updated 3 weeks ago