retr0-13 / AndroSpyView external linksLinks
☆55Mar 13, 2022Updated 3 years ago
Alternatives and similar repositories for AndroSpy
Users that are interested in AndroSpy are comparing it to the libraries listed below
Sorting:
- An Android RAT that written in C# by me☆59Jul 18, 2020Updated 5 years ago
- An Android RAT that written in C# by me☆24Jan 12, 2021Updated 5 years ago
- ☆11Apr 18, 2022Updated 3 years ago
- 一款基于python的shellcode免杀加载器,Bypass AV☆18Oct 26, 2023Updated 2 years ago
- exp for useful vuln☆12Jul 9, 2021Updated 4 years ago
- 💉 A tool that allows shellcode injection into another process's memory space. It works for both Windows x64 and x86 systems.☆12Oct 1, 2019Updated 6 years ago
- Malware campaigns and APTs research by BlackArrow☆19Apr 30, 2020Updated 5 years ago
- Convert xshell session to WindTerm user.session☆19Dec 15, 2023Updated 2 years ago
- Remote administration tool with native client☆44May 18, 2025Updated 8 months ago
- Windows Api调用,用来绕过杀软添加用户☆22May 15, 2021Updated 4 years ago
- Xss payload for bypassing waf☆18Apr 18, 2020Updated 5 years ago
- A solution to create obfuscated shellcode from msfvenom for PowerShell.☆26Aug 3, 2022Updated 3 years ago
- ☆10Sep 11, 2021Updated 4 years ago
- MBR virus☆25Jun 25, 2021Updated 4 years ago
- Tool to find Protections used with confuserex☆28Jul 16, 2018Updated 7 years ago
- I am not responsible for what is done with this project. This tool is solely written to be studied by other security researchers to see h…☆22Dec 24, 2023Updated 2 years ago
- Malware AV evasion via disable Windows Defender (Registry). C++☆35Jun 5, 2022Updated 3 years ago
- Este troyano para Android es uno de los más completos. Con él vamos a poder tener acceso a remoto a todo el dispositivo infectado, desde …☆125Sep 24, 2024Updated last year
- wallhack for cs:go game☆10Jul 7, 2024Updated last year
- Final assignment for the course Data Visualization with Python, part of IBM Data Science Professional Certification on Coursera☆11Jun 22, 2020Updated 5 years ago
- A simple Botnet. 一个简单的僵尸网络Bot。☆21Dec 30, 2020Updated 5 years ago
- 一款基于ThinkPHP5.1的XSS管理平台。☆29Dec 6, 2022Updated 3 years ago
- Encrypting and decrypting files with AES or RC4 on Microsoft Windows☆37Apr 6, 2014Updated 11 years ago
- 32 bit process inject shellcode to 32 bit process and 64 bit process☆35May 8, 2023Updated 2 years ago
- BOF/COFF obj file to PIC(shellcode). by golang☆39Sep 28, 2022Updated 3 years ago
- Call the CLR interface from memory to load powershell, process-less powershell☆15Sep 7, 2023Updated 2 years ago
- Android软件安全与逆向分析☆32Jun 8, 2018Updated 7 years ago
- HEVD Exploits for fun and learning.☆15Aug 30, 2025Updated 5 months ago
- BadUSB ile Penetrasyon☆13Jun 15, 2019Updated 6 years ago
- A tool for finding CNAME of subdomains and checking clickjacking vulnerability.☆12Jun 15, 2025Updated 7 months ago
- PassWord List Maker☆17Oct 29, 2018Updated 7 years ago
- fix dex by dump dexCodeItem☆45Jun 29, 2024Updated last year
- Go ransomware leveraging ChaCha20 and ECIES encryption with a web-based control panel.☆46Apr 27, 2025Updated 9 months ago
- 创建隐藏计划任务,权限维持,Bypass AV☆33Dec 8, 2021Updated 4 years ago
- Cobalt Strike < 4.4 dos CVE-2021-36798☆37Aug 19, 2021Updated 4 years ago
- Proof-of-concept implementation for the paper "Homomorphic Encryption for Large Integers from Nested Residue Number Systems", presented a…☆27Jun 4, 2025Updated 8 months ago
- Hack The Box OSCP-like VMs writeups☆11Oct 11, 2020Updated 5 years ago
- dockerfile of Acunetix Web Vulnerability Scanner14(210615184)☆14Jun 24, 2021Updated 4 years ago
- AscensionPath☆15Jun 15, 2025Updated 7 months ago