apk binder script
☆60Apr 7, 2014Updated 12 years ago
Alternatives and similar repositories for apk_binder_script
Users that are interested in apk_binder_script are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Xss Vulnerability Demonstration framework.☆12Aug 22, 2013Updated 12 years ago
- am just help you to bind your android payload with any original apk in ADVANCE like a pro. :D☆16Sep 30, 2019Updated 6 years ago
- EmPyre Web Interface☆12Mar 23, 2017Updated 9 years ago
- ransomware encrypte all filles,disque C,disque D,Usb ...etc, filles can not be decrypted☆17Nov 18, 2018Updated 7 years ago
- Evil Linux kernel module that hooks sys_read system call and lets a user get a reverse shell or execute shellcode in the kernel.☆15Mar 12, 2022Updated 4 years ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- A multi-purpose meterpreter executable (inline, many transports, msfpayload)☆81Mar 7, 2018Updated 8 years ago
- WH-ApkCrypter 100% google play bypass☆13May 3, 2020Updated 5 years ago
- Interfaces with a Metasploit RPC instance to generate .NET executables that run x86/x64 shell code in a platform-agnostic way. One binary…☆24Sep 28, 2017Updated 8 years ago
- Loads shellcode from a resource file.☆21Aug 15, 2019Updated 6 years ago
- Automated Information Retrieval From APKs For Initial Analysis☆33Oct 2, 2017Updated 8 years ago
- Nano meterpreter shell based on TinyMet☆28Aug 27, 2016Updated 9 years ago
- PySC - Download shellcode from a remote DNS server (using TXT records) or through Internet Explorer (using SSPI to utilize system-wide p…☆36Dec 27, 2013Updated 12 years ago
- Wireless discovery and exploitation framework written in Python☆18Dec 17, 2010Updated 15 years ago
- Common Industrial Protocol based device scanner over the internet☆24Mar 10, 2016Updated 10 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- This script runs multithreading module that connects to a remote TCP server, monitors active (opened) Microsoft Word documents (.doc,.doc…☆33Jul 24, 2020Updated 5 years ago
- use the Apple CoreText exploit (CVE-2012-3716) and launch an AP to affect all devices within wifi range☆21Jan 12, 2015Updated 11 years ago
- Automatically exported from code.google.com/p/ioctlbf☆17Mar 28, 2015Updated 11 years ago
- python based backdoor software☆17Oct 14, 2011Updated 14 years ago
- Create a C++ PE which loads an XTEA-crypted .NET PE shellcode in memory.☆17Sep 29, 2018Updated 7 years ago
- ~ ADMIN Panel Finder By Ⓜ Ⓐ Ⓝ Ⓘ Ⓢ Ⓢ Ⓞ ☪ ~☆21Jun 29, 2016Updated 9 years ago
- Run Any Native PE file as a memory ONLY Payload , most likely as a shellcode using hta attack vector which interacts with Powershell.☆28May 22, 2017Updated 8 years ago
- Nice try reading NTDLL from disk, nerd.☆19Apr 18, 2022Updated 4 years ago
- backdoor-apk is a shell script that simplifies the process of adding a backdoor to any Android APK file. Users of this shell script shoul…☆21May 9, 2017Updated 8 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Python script to inject and run shellcodes through TLS callbacks☆49Jun 22, 2015Updated 10 years ago
- ☆13Aug 18, 2016Updated 9 years ago
- Proof of concept open source implementation of an UAC bypass exploit, based in 2 windows failures.☆12Jun 2, 2020Updated 5 years ago
- Android anti-root detection Proof of Concept☆44May 9, 2015Updated 10 years ago
- IDA Pomidor is a plugin for Hex-Ray's IDA Pro disassembler that will help you retain concentration and productivity during long reversing…☆35Sep 23, 2014Updated 11 years ago
- Beagle(bone) in the Middle☆25Oct 9, 2020Updated 5 years ago
- Advanced HTTP fingerprinting PoC☆45Mar 27, 2017Updated 9 years ago
- Cross Distribution Exploit Testing☆28Sep 23, 2015Updated 10 years ago
- ☆14Feb 12, 2026Updated 2 months ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Fast Wi-Fi hijacker in C, based on AirPwn ideas and LORCON☆22Sep 21, 2017Updated 8 years ago
- SlyPI☆20Jun 13, 2013Updated 12 years ago
- A PowerShell script anti-virus evasion tool☆18Jan 3, 2021Updated 5 years ago
- Some ICS Vulnerabilities I've found will be listed here.☆13Nov 18, 2016Updated 9 years ago
- Python library that facilitates interfacing with BeEF via it's RESTful API☆79May 18, 2017Updated 8 years ago
- POC of code that downloads and executes shellcode in memory.☆80May 25, 2014Updated 11 years ago
- a very basic proxy obfuscator based on dnlib☆21Jul 3, 2018Updated 7 years ago