Linux tool used to extract sensitive data, inject backdoor or drop remote shells on android devices.
☆109Apr 13, 2016Updated 9 years ago
Alternatives and similar repositories for WhatsPwn
Users that are interested in WhatsPwn are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Debugger for HTC phones bootloader (HBOOT).☆20Nov 28, 2013Updated 12 years ago
- ARM rop chain gadget searcher☆38Oct 20, 2017Updated 8 years ago
- A security write-up about the Paypal API & data leakage☆25May 27, 2016Updated 9 years ago
- wow64 syscall filter☆13Nov 12, 2014Updated 11 years ago
- bmod parses binaries for modification/patching and disassembles machine code sections.☆12Apr 19, 2018Updated 7 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- another socks5 server , support linux, BSD , use epoll and kqueue technology☆13Jan 16, 2018Updated 8 years ago
- Exploit using barcodes, QRcodes, earn13, datamatrix☆116Apr 15, 2016Updated 9 years ago
- ☆14Jun 30, 2015Updated 10 years ago
- ☆38Jul 4, 2016Updated 9 years ago
- repository with additional materials and source code☆32Jan 18, 2017Updated 9 years ago
- Malware Fragmentation Tool its a tool that simply fragment the PE file and it can disassemble the PE file, etc this tool very useful for…☆37Nov 22, 2015Updated 10 years ago
- A QEMU based framework for instrumenting x86 programs from Python☆17Oct 5, 2020Updated 5 years ago
- SEAndroid Analytics Library for live device analysis☆60Mar 16, 2019Updated 7 years ago
- ☆22Aug 31, 2016Updated 9 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- AxSuite is a toolset aimed to retrieve in-memory secrets saved by AxCrypt☆12Aug 13, 2020Updated 5 years ago
- An Online Analysis System for Packed Android Malware☆107Jul 28, 2016Updated 9 years ago
- JNI method enumeration in ELF files☆50Jan 8, 2016Updated 10 years ago
- Implementation of a thin hypervisor☆43May 20, 2016Updated 9 years ago
- Network Guardian☆12Jun 29, 2017Updated 8 years ago
- ☆11Jun 10, 2015Updated 10 years ago
- Scanner de vulnerabilidades Web.☆15Sep 6, 2015Updated 10 years ago
- Remote Windows shell☆31Jun 22, 2014Updated 11 years ago
- Guest to host VM escape exploit for Parallels Desktop☆27Nov 14, 2014Updated 11 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- DiskCryptor - it's a free solution that allows you to encrypt disk partitions, including system partition.☆17Dec 7, 2011Updated 14 years ago
- The C-based Firmware Patching Framework for Broadcom/Cypress WiFi Chips that enables Monitor Mode, Frame Injection and much more☆12Oct 4, 2018Updated 7 years ago
- powerful auto-backdooring utility☆749Dec 20, 2017Updated 8 years ago
- A x86 systematic ROP payload generation☆57Feb 28, 2020Updated 6 years ago
- Vulnerability Assessment and Penetration Testing Toolkit☆19Jan 5, 2022Updated 4 years ago
- Overwrite C/C++ functions in memory for x86-32/64 on Linux, Mac & Windows☆15Jun 12, 2023Updated 2 years ago
- odex crc patcher☆12Sep 28, 2017Updated 8 years ago
- Simple Shellcode development/injection on macOS☆11Nov 6, 2017Updated 8 years ago
- .NET WPF Framework☆20Mar 9, 2017Updated 9 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- BrowserExploit is an advanced browser exploit pack for doing internal and external pentesting, helping gaining access to internal compute…☆332Apr 19, 2017Updated 8 years ago
- Windows Kernel Mode PCRE☆10Feb 4, 2015Updated 11 years ago
- profiling tool for analysising the games, get all the characteristic by hook d3d☆18Oct 10, 2014Updated 11 years ago
- Bypassing User Account Control (UAC) using TpmInit.exe☆131Sep 26, 2016Updated 9 years ago
- ☆56Jul 20, 2017Updated 8 years ago
- Volatility plugin to extract FileVault 2 VMK's☆51Sep 20, 2021Updated 4 years ago
- RSPET (Reverse Shell and Post Exploitation Tool) is a Python based reverse shell equipped with functionalities that assist in a post expl…☆263Oct 31, 2017Updated 8 years ago