kinghacker0 / Apk-BinderLinks
Using this Apk-Binder tool or script you can embed the metasploit payload or backdoor with apk files.
☆82Updated 5 years ago
Alternatives and similar repositories for Apk-Binder
Users that are interested in Apk-Binder are comparing it to the libraries listed below
Sorting:
- Undetectable helps you to generate fully undetectable payload of metasploit which can bypass android antivirus.☆109Updated 2 years ago
- Using open Adb ports we can exploit a devive☆99Updated 4 years ago
- ☆72Updated 3 years ago
- A Bloody RAT, is software that gives a person full control of a tech device, remotely.☆80Updated 3 years ago
- Make custom phishing page with Black-Water you just need to put required in create folder.☆36Updated 5 years ago
- Advanced MSF Payload Generator tool for Linux☆101Updated 9 months ago
- Remote Administration Tool For OS Linux☆53Updated 6 years ago
- Latest FUD GMail phishing webpage generator☆30Updated 5 years ago
- An easy tool to generate backdoor with msfvenom (a part from metasploit framework). This tool compiles a malware with popular payload and…☆133Updated 9 years ago
- Lazymux is a huge list of Many Hacking tools and PEN-TESTING tools! NOTE: Am not Responsible of bad use of this project.☆157Updated 5 years ago
- Androspy framework is a Backdoor Crypter & Creator with Automatic IP Poisener☆260Updated 7 years ago
- Phishing mobile application made in React Native for both Android and iOS devices.☆34Updated 4 years ago
- Make a 100% FUD Android Trojan and Bypass All Anti-Viruses + Android Google Play Protector☆101Updated 2 months ago
- A Simple work in progress DDOS BOTNET coded in python Which also runs TOR☆78Updated 6 years ago
- Phishing Tool For Advanced Instagram Copyright Infringement Attack☆82Updated 2 years ago
- ☆61Updated 6 years ago
- Compile Python Script to Base64,Zlib,Marshal☆91Updated 5 years ago
- Whatsapp Automatic Payload Generator [CVE-2019-11932]☆33Updated 4 years ago
- ☆87Updated 7 years ago
- ☆27Updated 4 years ago
- Usage of WH-HackerExploit Hacking Tool for attacking targets without prior mutual consent is illegal. It's the end user's responsibility …☆38Updated 3 years ago
- Simple script masks the phishing link under the normal URL☆86Updated 4 years ago
- Hack Anyone's WiFi☆16Updated 2 years ago
- A Tool For Lazy People.☆31Updated 4 years ago
- DarkSploit Framework☆93Updated 4 years ago
- whatsapp remote code execution☆124Updated 6 years ago
- The Working and Correct Installation of Ngrok Port Tunnelling☆36Updated 2 years ago
- The Social-Engineer Toolkit (SET) automatic installer for Android☆115Updated 6 years ago
- D-TECT - Pentesting the Modern Web☆59Updated 3 years ago
- Reverse engineered OTP Apis.☆101Updated last year