iancohee / AndroidReverseShell
Reverse Shell for Android
☆23Updated 10 years ago
Alternatives and similar repositories for AndroidReverseShell:
Users that are interested in AndroidReverseShell are comparing it to the libraries listed below
- MS17-010☆12Updated 7 years ago
- Exploiting Android Devices Running Insecure Remote ADB Service☆20Updated 6 years ago
- Analyze Wireless Packets on the fly. Currently supporting three working Modes (Reader, Live, Stealth)☆51Updated 7 years ago
- This is the list of all rootkits found so far on github and othersites.☆29Updated 4 years ago
- pentest toolbox☆28Updated 2 years ago
- Wardriving ekoparty☆15Updated 7 years ago
- pure python remote adb scanner + nmap scan module☆21Updated 6 years ago
- Framework for obtaining all the credentials stored in vulnerable Netwave IP cameras. Can be used to break into IP cameras, use for resear…☆35Updated 5 years ago
- Offensive Android Kernel on Steroids - Shuriken is an Android kernel for Oneplus 5/5T which supports multiple features for pentesting.☆28Updated 6 years ago
- Discovers and exploits hosts vulnerable to MS08-067/MS17-010☆41Updated 7 years ago
- gui tool to create normal payload by msfvenom☆32Updated 6 years ago
- Python script for trying default passwords for some TP-Link Hotspots☆35Updated 3 years ago
- Metasploit python-payload obfuscation, to allow penetration testers bypass Antivirus solutions.☆29Updated 2 years ago
- TP-Link Archer C50 V3 devices before Build 200318 Rel. 62209 allows remote attackers to cause a denial of service via a crafted HTTP Head…☆19Updated 5 years ago
- A tool for recover router password☆29Updated 6 years ago
- This tool will setting up your backdoor/rootkits when backdoor already setup it will be hidden your spesisifc process,unlimited your sess…☆22Updated 7 years ago
- pen testing scripts☆11Updated 4 years ago
- Python script that acts like the original sudo binary to fool users into entering their passwords☆19Updated 8 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 4 years ago
- Simple (but working) WEP/WPA/WPA2 Hacking script☆30Updated 9 years ago
- Simple Karma Attack☆67Updated 4 years ago
- Exploit Pack - One step ahead☆11Updated 11 years ago
- Simple mods to wpa_supplicant to allow more efficient online bruting☆18Updated 5 years ago
- Tools and scripts dedicated to Android application security☆48Updated 4 years ago
- [BASH] Password generator through a wordlist☆12Updated 12 years ago
- AIL framework - Analysis Information Leak framework☆8Updated 7 years ago
- Passphrase wordlist and hashcat rules for offline cracking of long, complex passwords☆13Updated 6 years ago
- Uses Shodan API to pull down C2 servers to run known exploits on them.☆18Updated 7 years ago
- Automate the creation of Backdoors and postexplotation activities☆22Updated 2 years ago
- Sends some one a malicious payload through smtp and starts a listener with metasploit.☆35Updated 7 years ago