lululeta2014 / DendroidSource
This is an updated version of Dendroid with a working panel & APK, I hope that everyone enjoys this download.
☆42Updated 10 years ago
Alternatives and similar repositories for DendroidSource:
Users that are interested in DendroidSource are comparing it to the libraries listed below
- Metasploit Exploit Module for the Android addJavascriptInterface Issue (MITM)☆35Updated 10 years ago
- Simple framework to extract "actionable" data from Android malware (C&Cs, phone numbers etc.)☆103Updated 9 years ago
- Automatic backdooring apk with meterpreter (PoC)☆51Updated 8 years ago
- Android Device Testing Framework ("dtf")☆85Updated 2 years ago
- Linux tool used to extract sensitive data, inject backdoor or drop remote shells on android devices.☆107Updated 8 years ago
- Firefox, Chrome, Safari browser extensions, Rails control server, meterpreter scripts, SET plugin☆54Updated 2 years ago
- Automated antivirus test environment (new version)☆50Updated 9 years ago
- backHack, a tool to perform Android app analysis by backing up and extracting apps, allowing you to analyze and modify file system conten…☆64Updated 4 years ago
- NSA EquationGroup C&C Hunter using the Shodan API☆28Updated 9 years ago
- ☆30Updated 8 years ago
- Various Scripts for Mobile Pen-testing with Frida☆75Updated 8 years ago
- CMS Exploit Scripts☆12Updated 9 years ago
- apk binder script☆60Updated 10 years ago
- Wi-Fi Backdoors☆38Updated 9 years ago
- Multi-threaded SSH Password Auditor☆93Updated 11 years ago
- Simple bruteforcer for EDA2/HiddenTear based ransomware.☆26Updated 8 years ago
- Proof of Concepts, Exploits☆28Updated 6 years ago
- Powershell fork of Monohard by Carlos Ganoza P. This botnet/backdoor was designed to egress over unecrypted web using very little, but e…☆41Updated 3 years ago
- AutoBrowser Screenshot☆48Updated 8 years ago
- Stagefright Android exploit☆18Updated 2 years ago
- Sentinel is a command line tool able to protect Windows 32 bit programs against exploits targeted by attackers or viruses. It can protect…☆71Updated 10 years ago
- Tool used for dumping memory from Android devices☆68Updated 9 years ago
- pwning & info gathering via user browser☆39Updated 9 years ago
- Metasploit Usage Wiki☆48Updated 9 years ago
- Dorker, programa utilizado para automatizar pesquisas em buscadores, faz uso de alguns filtros.☆16Updated 9 years ago
- Wireless Reconnaissance And Intelligent Target Harvesting☆48Updated 8 years ago
- Automated man-in-the-middle attack tool.☆50Updated 10 years ago
- Multithreaded DNS recursive host brute-force tool☆13Updated 9 years ago
- Miscellaneous projects related to attacking Windows.☆27Updated 5 years ago
- Post-Exploitation Framework☆75Updated 8 years ago