lululeta2014 / DendroidSourceLinks
This is an updated version of Dendroid with a working panel & APK, I hope that everyone enjoys this download.
☆41Updated 11 years ago
Alternatives and similar repositories for DendroidSource
Users that are interested in DendroidSource are comparing it to the libraries listed below
Sorting:
- Linux tool used to extract sensitive data, inject backdoor or drop remote shells on android devices.☆107Updated 9 years ago
- Android Device Testing Framework ("dtf")☆85Updated 2 years ago
- Various Scripts for Mobile Pen-testing with Frida☆76Updated 9 years ago
- backHack, a tool to perform Android app analysis by backing up and extracting apps, allowing you to analyze and modify file system conten…☆66Updated 5 years ago
- Automatic backdooring apk with meterpreter (PoC)☆52Updated 9 years ago
- ARP poison and sniff with DNS spoofing, urlsnarf, driftnet, ferret, dsniff, sslstrip and tcpdump☆26Updated 10 years ago
- Metasploit Exploit Module for the Android addJavascriptInterface Issue (MITM)☆36Updated 10 years ago
- Proof of Concepts, Exploits☆28Updated 5 months ago
- NSA EquationGroup C&C Hunter using the Shodan API☆29Updated 10 years ago
- ☆78Updated 6 years ago
- Simple framework to extract "actionable" data from Android malware (C&Cs, phone numbers etc.)☆108Updated 10 years ago
- A tool to perform automated forensic analysis of Chrome Browser.☆33Updated 8 years ago
- Stagefright Android exploit☆18Updated 3 years ago
- A reverse ssh shell written in python, intended for penetration testers to use as a covert channel on windows☆87Updated 9 years ago
- Automated man-in-the-middle attack tool.☆52Updated 11 years ago
- Some NSE scripts to search information from routers☆36Updated 9 years ago
- dhcpig : initiates an advanced DHCP exhaustion attack☆61Updated 9 years ago
- Multi-threaded SSH Password Auditor☆93Updated 11 years ago
- A simple way for detection the remote user's antivirus☆84Updated 8 years ago
- Try various exploits to get root☆19Updated 11 years ago
- pwning & info gathering via user browser☆39Updated 10 years ago
- ☆31Updated 9 years ago
- Create a DDOS attack using SNMP servers☆44Updated 11 years ago
- Tool used for dumping memory from Android devices☆68Updated 10 years ago
- Windows Crypt API hook to generate weak keys☆48Updated 8 years ago
- Some exploits for ZeroNights 0x03☆36Updated 10 years ago
- Post Exploitation Linux Toolkit☆33Updated 8 years ago
- ☆54Updated 8 years ago
- Peach Fuzzer Web Frontend☆52Updated 4 years ago
- CVE-2017-11882 File Generator PoC☆35Updated 7 years ago