Metasploit Multi Purpose Exploiting Toolkit For Termux
☆31Sep 23, 2021Updated 4 years ago
Alternatives and similar repositories for MSF-ANDRO
Users that are interested in MSF-ANDRO are comparing it to the libraries listed below
Sorting:
- Encode & Decode Hash Text☆14Oct 28, 2021Updated 4 years ago
- Exploiting Android devices☆10Sep 12, 2022Updated 3 years ago
- ☆10Apr 27, 2025Updated 10 months ago
- ☆10Apr 2, 2023Updated 2 years ago
- This script will install ADB and FASTBOOT to termux!☆87Oct 4, 2021Updated 4 years ago
- Automated Phising Tool With Upto 45+ UptoDate Phising Templates & With a Inbuilt Url Masker☆115Nov 6, 2021Updated 4 years ago
- Hydra In Termux☆81Jun 11, 2023Updated 2 years ago
- ☆15May 6, 2023Updated 2 years ago
- Herramienta de ingeniería social (Creador de puerta trasera con Reverse Shell para Windows/Android) con Ngrok.☆77Mar 14, 2023Updated 2 years ago
- ☆15May 19, 2020Updated 5 years ago
- Meterpreter payload for all platforms☆74Jan 2, 2022Updated 4 years ago
- Malware detonation platform Polygon integration☆10Aug 1, 2023Updated 2 years ago
- Herramienta de recopilación de información por numero de DNI de PERU . Herramienta garantizado.☆13Nov 18, 2024Updated last year
- ☆12Aug 14, 2020Updated 5 years ago
- Hacking Tool!! This Tools help you with ethical hacking, Social media hack, phone info, Gmail attack, phone number attack, user discovery…☆16Dec 23, 2024Updated last year
- Remote Access Trojan I wrote, but didn't finish. Although, you could use this as is without many issues.☆39Oct 23, 2024Updated last year
- How to Hack an Android Phone using an Malicious Android Application - Part-2 (More Sophisticated Way)☆11Oct 26, 2021Updated 4 years ago
- TUI file explorer based on PowerShell and fzf☆10Aug 4, 2025Updated 7 months ago
- New Tool to generate a dangerous android , windows etc virus 😈☆11Jun 30, 2021Updated 4 years ago
- ALL IN ONE Hacking Tool For Hackers☆10Jun 2, 2022Updated 3 years ago
- A collection of tools for managing and automating vulnerability management.☆13Mar 24, 2022Updated 3 years ago
- Generate Undetectable Metasploit Payload in a simple way☆38Dec 19, 2023Updated 2 years ago
- My Nmap without root privileges! For hackers.☆43Jul 30, 2023Updated 2 years ago
- Generate FUD Droppers that are undetectable by popular AV's☆32Oct 21, 2023Updated 2 years ago
- Python emulator of msfconsole☆11Dec 28, 2019Updated 6 years ago
- 4.2 e-ink (Greentag)☆13Dec 16, 2024Updated last year
- A rust binary that outputs workspace information from niri-ipc to be consumed by eww☆19Jan 22, 2026Updated last month
- Using this tool you can increase visitors in your blog. Just copy link and paste, enter number of visitors and wait for the process. Not …☆10Aug 18, 2020Updated 5 years ago
- ☆11Nov 10, 2020Updated 5 years ago
- This is Repo holds the Installation scripts for installing Hyprland, Hyprland-dependency, and my Hyprland dots☆10Aug 28, 2025Updated 6 months ago
- ☆10Apr 2, 2022Updated 3 years ago
- FireVu is an Intentionally vulnerable Android application developed for Android open source security.☆11Mar 13, 2024Updated last year
- This is the linux version of the R.A.T client written in c#☆10Jun 25, 2017Updated 8 years ago
- AliGuard PHP WAF☆12Feb 16, 2024Updated 2 years ago
- ☆22Jul 13, 2022Updated 3 years ago
- Python Virus!☆10Mar 16, 2023Updated 2 years ago
- 「💥」CVE-2022-26134 - Confluence Pre-Auth RCE☆14Jun 19, 2022Updated 3 years ago
- Scan a host for open HTTP ports and gain information about the services present.☆12Jul 20, 2022Updated 3 years ago
- DDos attack☆10Feb 13, 2023Updated 3 years ago