kinghacker0 / Apk-BinderLinks
Using this Apk-Binder tool or script you can embed the metasploit payload or backdoor with apk files.
☆82Updated 5 years ago
Alternatives and similar repositories for Apk-Binder
Users that are interested in Apk-Binder are comparing it to the libraries listed below
Sorting:
- Undetectable helps you to generate fully undetectable payload of metasploit which can bypass android antivirus.☆112Updated last year
- Using open Adb ports we can exploit a devive☆98Updated 4 years ago
- Advanced MSF Payload Generator tool for Linux☆94Updated 5 months ago
- A Bloody RAT, is software that gives a person full control of a tech device, remotely.☆76Updated 2 years ago
- Androspy framework is a Backdoor Crypter & Creator with Automatic IP Poisener☆259Updated 6 years ago
- whatsapp remote code execution☆124Updated 5 years ago
- ☆71Updated 2 years ago
- Make a 100% FUD Android Trojan and Bypass All Anti-Viruses + Android Google Play Protector☆99Updated last year
- Make custom phishing page with Black-Water you just need to put required in create folder.☆35Updated 5 years ago
- An easy tool to generate backdoor with msfvenom (a part from metasploit framework). This tool compiles a malware with popular payload and…☆129Updated 9 years ago
- A Simple work in progress DDOS BOTNET coded in python Which also runs TOR☆82Updated 6 years ago
- Remote Administration Tool For OS Linux☆53Updated 6 years ago
- Phishing mobile application made in React Native for both Android and iOS devices.☆34Updated 4 years ago
- ☆85Updated 7 years ago
- Simple script masks the phishing link under the normal URL☆85Updated 4 years ago
- Usage of WH-HackerExploit Hacking Tool for attacking targets without prior mutual consent is illegal. It's the end user's responsibility …☆40Updated 3 years ago
- Whatsapp Automatic Payload Generator [CVE-2019-11932]☆32Updated 3 years ago
- Shellphish is created by TheLinuxChoice but after the repository deleted we recreate this. To know how to use shellphish visit our websit…☆94Updated 5 years ago
- The Working and Correct Installation of Ngrok Port Tunnelling☆35Updated 2 years ago
- Usage of WH-HackerExploit Hacking - v2 Tool for attacking targets without prior mutual consent is illegal. It's the end user's responsib…☆63Updated 5 years ago
- *phonelock* is a phishing attacks Tools help for hack Android password☆75Updated 5 years ago
- Run interactive android exploits in linux.☆146Updated 7 months ago
- Phishing Tool For Advanced Instagram Copyright Infringement Attack☆83Updated last year
- Compile Python Script to Base64,Zlib,Marshal☆92Updated 5 years ago
- D-TECT - Pentesting the Modern Web☆59Updated 3 years ago
- ☆61Updated 5 years ago
- Generate Professional Phishing Emails Fast And Easy☆25Updated 4 years ago
- Automated Payload Generator Tool☆108Updated 4 years ago
- Android Keylogger / Keylogging Keyboard☆134Updated 3 years ago
- Network Attack wifi attack vlan attack arp attack Mac Attack Attack revealed etc../☆141Updated 5 years ago