Worm is an Android post exploitation Framework to gain remote access of any Android device by exploiting Android Debug Bridge.
☆14Jun 7, 2024Updated last year
Alternatives and similar repositories for worm
Users that are interested in worm are comparing it to the libraries listed below
Sorting:
- a simple keylogger that records hardware inputs like keyboard, mouse, microphone and webcam and sends it to your e-mail.☆14Oct 18, 2024Updated last year
- HideMePlease is a new generation tool to hide phising web links into legitimate web links with original domains (eg: facebook.com, instag…☆25Jun 3, 2024Updated last year
- For accessing info of both public and private instagram accounts☆17Aug 29, 2022Updated 3 years ago
- Эксплойт для уязвимости CVE-2024-0039 на Android, который позволяет выполнять произвольный код через MP4 файл. Этот репозиторий создан дл…☆12May 29, 2024Updated last year
- ☆12Jul 4, 2024Updated last year
- Communication Relay by creating a WiFi Mesh Network using ROS, and using that network for Data Telemetry, with Telemetry radios ( Ubiquit…☆11Dec 18, 2018Updated 7 years ago
- Hack facebook using this python script - Kali Linux☆15Jun 14, 2021Updated 4 years ago
- POC for CVE-2024-31982: XWiki Platform Remote Code Execution > 14.10.20☆10Jun 22, 2024Updated last year
- ☆16Nov 12, 2025Updated 3 months ago
- Project Warmth, a responsive web application that provides support, resources, and warmth to underserved communities through collaborativ…☆13Feb 5, 2025Updated last year
- Objective Develop a web-based chatbot application where users upload resumes (PDF or image). The system should: 1. Extract resume content…☆21Sep 30, 2025Updated 5 months ago
- Loads NTDLL, parses the PE file, extracts "Zw" functions, retrieves their System Service Numbers (SSNs), and prints each function’s name,…☆15Apr 21, 2025Updated 10 months ago
- The tool helps in quickly identifying vulnerabilities by examining a comprehensive list of potential paths on a website, making it useful…☆11Mar 24, 2025Updated 11 months ago
- ☆10Jun 15, 2024Updated last year
- SearchToolkit is advanced collection of tools, hardwares, resources and cheatsheets useful for Pentester, Red Teamer, Bug Hunter, Forensi…☆21Feb 15, 2026Updated 2 weeks ago
- a curated awesome list of awesome projects☆15Jun 14, 2025Updated 8 months ago
- Windows Antivirus Evasion and Memory Injection☆12Feb 19, 2022Updated 4 years ago
- javascript botnet browser V3 based one Cloud 9 Botnet and my botnet browser chrome. capture any web site,virtual clavier ,paypal,facebook…☆10Sep 12, 2020Updated 5 years ago
- AI-powered code review assistant for GitHub Pull Requests using OpenAI GPT-4 and Claude with automated feedback and analytics dashboard.☆22Dec 13, 2025Updated 2 months ago
- A curated list of best ai tools☆34Aug 20, 2025Updated 6 months ago
- Solana Copy Trading Bot, This Solana copy trading bot uses gRPC and ShredStream for ultra-low latency. 0 block auto copy trading, frontru…☆21Aug 4, 2025Updated 7 months ago
- Whenever PowerShell is launched, Notepad will also open. You can customize the script for educational purposes, but I emphasize that I do…☆12Apr 21, 2025Updated 10 months ago
- ☆12May 21, 2025Updated 9 months ago
- 💎 | RubyRedOps is a repository for advanced Red Team techniques and offensive malware, focused on Ruby☆10Apr 21, 2025Updated 10 months ago
- A curated list of AI-powered coding tools☆35Aug 14, 2025Updated 6 months ago
- My Android SuperHack app source.☆15Nov 14, 2025Updated 3 months ago
- MSBuild ConfuserEx Target☆11Jul 21, 2025Updated 7 months ago
- CVE-2024-44000 is a vulnerability in the LiteSpeed Cache plugin, a popular WordPress plugin. This vulnerability affects session managemen…☆15Sep 6, 2024Updated last year
- Authentication Bypass Vulnerability — CVE-2024–4358 — Telerik Report Server 2024☆12Nov 26, 2024Updated last year
- HACKING BOT is an automated bug bounty tool that streamlines security testing by running multiple cybersecurity tools in parallel. It all…☆19Mar 6, 2025Updated 11 months ago
- big layout update - 12/11/2025 Old layout can be viewed here - https://github.com/COUNTRY-HUMANS/old-readme☆25Feb 15, 2026Updated 2 weeks ago
- Exploit for CVE-2024-5009☆13Jul 8, 2024Updated last year
- Enable-All-Tokens is a Go-based project designed to adjust and enable a list of specified privileges for the current process token on a W…☆10Apr 21, 2025Updated 10 months ago
- Torrentpier v2.4.1. CVE-2024-1651. Remote Code Execution (RCE). Exploit.☆14Mar 7, 2024Updated last year
- ⚔️ Red Team tools for capturing credentials & planting payloads using native Windows features.☆11Jan 25, 2026Updated last month
- ☆18Jun 25, 2024Updated last year
- Token-based AngularJS Authentication☆32Dec 17, 2023Updated 2 years ago
- Divulge Stealer a highly advanced info-stealer that outperforms its predecessor, Umbral-Stealer by Blank-c. This new iteration is a compl…☆16Jan 7, 2025Updated last year
- A hand-picked collection of tools and resources for Vibe Coding☆37Aug 3, 2025Updated 7 months ago