liltrendi / Astroy
A bunch of PHP templates and Python scripts made to demonstrate how easy it is to pull off social engineering and phishing to successfully distribute Android malware
☆5Updated 5 years ago
Related projects: ⓘ
- Python script that will extract all saved passwords from your google chrome database on windows only☆68Updated 3 years ago
- ☆113Updated this week
- Security program for recovering passwords and pen-testing servers, routers and IoT devices using brute-force password attacks.☆44Updated 6 months ago
- ☆30Updated this week
- Captive Portal. A Hotspot or Evil twin which redirects the clients to login page to enter credentials. Simple and easy to use with less b…☆21Updated 6 years ago
- ☆112Updated this week
- HTTP botnet☆61Updated 8 years ago
- PAnalizer is a forensic tool, you can search pornographic images in a specific directory, this is util in Pedestrian Detection. Also you …☆44Updated 5 years ago
- Use Invoke-PSImage to deliver a payload in an Image☆53Updated 6 years ago
- Hacking tools resources☆32Updated 10 years ago
- ☆59Updated this week
- CryptoTrojan in Python (For educational purpose ONLY)☆44Updated 6 years ago
- 😈 The Demon App Store☆29Updated 3 years ago
- web information gathering / Grab links☆41Updated 4 years ago
- "PRinter Exploitation Toolkit" LAN automation tool☆196Updated 4 years ago
- Automated Tools Pentest☆5Updated last year
- imR0T: Send a quick message with simple text encryption to your whatsapp contact and protect your text by encrypting and decrypting, basi…☆76Updated 5 years ago
- ☆29Updated this week
- ☆36Updated this week
- ☆101Updated this week
- A simple bash based metasploit automation tool!☆120Updated last year
- Find all cool documents on GOV and Info sites☆18Updated 5 years ago
- Arduino Rubber Ducky Framework☆105Updated 5 years ago
- detect trojans in an easy way 🛡️☆29Updated 6 years ago
- Simple backdoor for public places, that uses a file system for communication. Just for fun! 😈☆52Updated 4 years ago
- Full malware Kit☆58Updated 3 years ago
- ☆32Updated 11 years ago
- Experimental examples of Ransomware in different languages☆37Updated 6 years ago
- Simple (but working) WEP/WPA/WPA2 Hacking script☆29Updated 8 years ago
- Red Login: SSH Brute-force Tools☆101Updated 6 years ago