esfelurm / android-ransomware
A ransomware for Android!
☆17Updated last year
Alternatives and similar repositories for android-ransomware:
Users that are interested in android-ransomware are comparing it to the libraries listed below
- This project provides insights into how ransomware operates without the need to install any applications.☆12Updated last year
- My Nmap without root privileges! For hackers.☆33Updated last year
- Automatic XSS Vulnerability Scanner, Dorker, and Payload Injector☆22Updated 4 months ago
- This is a DDOS tool {denial-of-service} by sending commands to botnet members. Botnet members can be called zombies and the botnet itself…☆58Updated last week
- A powerfull recon cat tool☆22Updated 10 months ago
- A good tool to hide phishing traps or cut links.☆35Updated last year
- Infect Android devices by sending links to targets☆41Updated last week
- Z-Ransom (Create Android Ransomware In Kali linux and Termux (NO ROOT)☆49Updated 2 years ago
- Meterpreter payload for all platforms☆66Updated 3 years ago
- that is a very sophisticated deface tool☆10Updated 2 years ago
- Best Google Dorker Available☆33Updated 4 months ago
- A tool to generate valid ip addresses of 55 countries. These ip's can be used for OpenBullet.☆28Updated 3 months ago
- This tool will create a .exe file which will send you all the information of victim once the file executes!☆35Updated 2 months ago
- Virus Repository☆44Updated 4 months ago
- People Profiler (fake script)☆21Updated 4 months ago
- Tool For Frontal Camera Hack.☆52Updated last year
- PRECISELY PINPOINT PEDO LOCATION THROUGH THE ART OF SOCIAL ENGINEERING☆21Updated last month
- This is a tool for searching or osint on Instagram to find target information☆43Updated last week
- URLs very strong obfuscation tool (can be used in requests too)☆12Updated 4 months ago
- exploit-X Create Android Ransomware In Termux (NO ROOT). This Tool automate task of create the android ransomware apk with encryption key…☆22Updated last week
- SADBOT - A simple tool for exploitation on android devices via ADB, users can find vulnerable devices using shodan search.☆38Updated 2 years ago
- A tool that uses public proxies to find and scan sites for sql injection vulnerability.☆10Updated last week
- The Most Powerful Fake Page Redirecting tool...☆53Updated 2 years ago
- The purpose of this tool is to automate the payload Creation Process. U can Create Payloads For All Types of OS in Seconds.☆53Updated last year
- The best tools for web attacks, with a variety of good options.☆17Updated 9 months ago
- Termux üçün Hacking Tool / Hacking Tool for Termux☆24Updated last year
- Reverse And Dorking Tools☆26Updated 3 years ago
- H-SPLOIT-PAYLOAD GENERATE METASPLOIT PAYLOAD IN 1 CLICK☆30Updated 3 years ago
- A Powerful DDoS Tool For making Any Service DOWN, Also Included Proxies and Socks for Anonymization☆52Updated last year