iancohee / AndroidReverseShellLinks
Reverse Shell for Android
☆24Updated 11 years ago
Alternatives and similar repositories for AndroidReverseShell
Users that are interested in AndroidReverseShell are comparing it to the libraries listed below
Sorting:
- Analyze Wireless Packets on the fly. Currently supporting three working Modes (Reader, Live, Stealth)☆51Updated 7 years ago
- MS17-010☆12Updated 7 years ago
- Python script that acts like the original sudo binary to fool users into entering their passwords☆19Updated 8 years ago
- Fake AccessPoint Attack☆30Updated 6 years ago
- pure python remote adb scanner + nmap scan module☆21Updated 6 years ago
- Simple (but working) WEP/WPA/WPA2 Hacking script☆30Updated 9 years ago
- The router hacking repo.☆33Updated 9 years ago
- A simple python reverse shell written just for fun.☆64Updated 2 years ago
- Discovers and exploits hosts vulnerable to MS08-067/MS17-010☆41Updated 7 years ago
- Offensive Android Kernel on Steroids - Shuriken is an Android kernel for Oneplus 5/5T which supports multiple features for pentesting.☆28Updated 6 years ago
- A tool for recover router password☆30Updated 6 years ago
- Metasploit installer for Debian (Jessie) VPS.☆25Updated 8 years ago
- pentest toolbox☆28Updated 2 years ago
- Modern problems require modern solutions☆31Updated 2 years ago
- AIL framework - Analysis Information Leak framework☆8Updated 7 years ago
- This tool will setting up your backdoor/rootkits when backdoor already setup it will be hidden your spesisifc process,unlimited your sess…☆22Updated 7 years ago
- Scans the internet for open FTP servers looking for common malware bot droppers and grabs them for sampling. Also provides support for up…☆48Updated 8 years ago
- Uses Shodan API to pull down C2 servers to run known exploits on them.☆18Updated 7 years ago
- A tool that enumerates Android devices for information useful in understanding its internals and for exploit development. It supports and…☆52Updated 7 years ago
- Software exploitation training material☆15Updated 7 years ago
- Some metasploit scripts to help to control busybox based embedded devices☆27Updated 9 years ago
- Exploit Pack - One step ahead☆11Updated 11 years ago
- Security program for recovering passwords and pen-testing servers, routers and IoT devices using brute-force password attacks.☆47Updated last year
- Super Simple Python Word List Generator for Fuzzing and Brute Forcing in Python☆54Updated 4 years ago
- Passphrase wordlist and hashcat rules for offline cracking of long, complex passwords☆13Updated 7 years ago
- A collection of wireless based bind and reverse connect shells for penetration testers to use in demonstrating persistence to a network v…☆39Updated 9 years ago
- #Super-dracOS Dracos Linux is an open source operating system provides to penetration testing. Packed with a ton of pentest tools includi…☆33Updated 8 years ago
- flood area with fake essids☆21Updated 7 years ago
- Sends some one a malicious payload through smtp and starts a listener with metasploit.☆35Updated 7 years ago
- This is the list of all rootkits found so far on github and othersites.☆29Updated 4 years ago