jaythaceo / Android-exploit
Stagefright Android exploit
☆17Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for Android-exploit
- Linux tool used to extract sensitive data, inject backdoor or drop remote shells on android devices.☆107Updated 8 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Updated 8 years ago
- NetHunter android application☆8Updated 5 years ago
- Scripts and other goodies from the pwnieexpress project ported☆10Updated 10 years ago
- Dorker, programa utilizado para automatizar pesquisas em buscadores, faz uso de alguns filtros.☆16Updated 8 years ago
- Wi-Fi Backdoors☆37Updated 9 years ago
- Automated man-in-the-middle attack tool.☆49Updated 10 years ago
- Metasploit Usage Wiki☆48Updated 9 years ago
- Metasploit Exploit Module for the Android addJavascriptInterface Issue (MITM)☆34Updated 9 years ago
- Various Scripts for Mobile Pen-testing with Frida☆75Updated 8 years ago
- Scripts for Kali Linux☆17Updated 7 years ago
- WPS scan and pwn tool☆66Updated 5 years ago
- A remote msfconsole written in Python 2.7 to connect to the msfrcpd server of metasploit. This tool gives you the ability to load modules…☆55Updated 6 years ago
- Working Rsh Client With Bind/Reverse Shell☆20Updated 9 years ago
- Automatic backdooring apk with meterpreter (PoC)☆51Updated 8 years ago
- A simple tool to dump users in popular forums and CMS :)☆28Updated 6 years ago
- rev-door is a small backdoor with only ONE line of PHP code, which takes command from POST data and execute it on server side. It is like…☆26Updated 8 years ago
- Holepuncher, A wrapper script to open ports in iptables and start a listener.☆32Updated 8 years ago
- Exploits that are mostly ready to use. They either require no modification or have been modified and verified as functional.☆60Updated 9 years ago
- Wireless Reconnaissance And Intelligent Target Harvesting☆48Updated 8 years ago
- Automates sslstrip arp spoofing MITM attack. FOR TESTING PURPOSES ONLY.☆36Updated 8 years ago