☆56Mar 13, 2022Updated 3 years ago
Alternatives and similar repositories for AndroSpy
Users that are interested in AndroSpy are comparing it to the libraries listed below
Sorting:
- An Android RAT that written in C# by me☆60Jul 18, 2020Updated 5 years ago
- An Android RAT that written in C# by me☆24Jan 12, 2021Updated 5 years ago
- ☆11Apr 18, 2022Updated 3 years ago
- 一款基于python的shellcode免杀加载器,Bypass AV☆18Oct 26, 2023Updated 2 years ago
- exp for useful vuln☆12Jul 9, 2021Updated 4 years ago
- 简单版的PE加载器☆12Aug 11, 2020Updated 5 years ago
- Using syscall to load shellcode, Evasion techniques☆27Jul 18, 2021Updated 4 years ago
- ☆13Jan 15, 2025Updated last year
- 💉 A tool that allows shellcode injection into another process's memory space. It works for both Windows x64 and x86 systems.☆12Oct 1, 2019Updated 6 years ago
- Malware campaigns and APTs research by BlackArrow☆19Apr 30, 2020Updated 5 years ago
- Convert xshell session to WindTerm user.session☆19Dec 15, 2023Updated 2 years ago
- Remote administration tool with native client☆44May 18, 2025Updated 9 months ago
- 超牛批安卓远控☆44Nov 27, 2019Updated 6 years ago
- Windows Api调用,用来绕过杀软添加用户☆22May 15, 2021Updated 4 years ago
- <?xml version="1.0" encoding="UTF-8"?> <!DOCTYPE html><html xmlns="http://www.w3.org/1999/xhtml" dir="ltr" lang="en" xml:lang="en" class=…☆10Jun 13, 2017Updated 8 years ago
- 个人输出,经验/思路/想法/总结/. . .☆26Sep 6, 2021Updated 4 years ago
- A solution to create obfuscated shellcode from msfvenom for PowerShell.☆26Aug 3, 2022Updated 3 years ago
- ☆10Sep 11, 2021Updated 4 years ago
- ApoalypseSecTool更新地址☆32Apr 26, 2023Updated 2 years ago
- Tool to find Protections used with confuserex☆28Jul 16, 2018Updated 7 years ago
- Source: http://rootkiter.com/Termite/☆26Dec 31, 2016Updated 9 years ago
- Malware AV evasion via disable Windows Defender (Registry). C++☆35Jun 5, 2022Updated 3 years ago
- wallhack for cs:go game☆11Jul 7, 2024Updated last year
- Final assignment for the course Data Visualization with Python, part of IBM Data Science Professional Certification on Coursera☆11Jun 22, 2020Updated 5 years ago
- A simple Botnet. 一个简单的僵尸网络Bot。☆21Dec 30, 2020Updated 5 years ago
- A modified, bug-fixed, and feature-enhanced version of the discontinued open-source Android remote administration tool AhMyth RAT. Experi…☆41Jul 28, 2024Updated last year
- 一款基于ThinkPHP5.1的XSS管理平台。☆29Dec 6, 2022Updated 3 years ago
- Call the CLR interface from memory to load powershell, process-less powershell☆15Sep 7, 2023Updated 2 years ago
- 使用Csharp实现自动修改注册表键并强制锁屏,使其可被抓取明文密码。☆30Dec 3, 2020Updated 5 years ago
- BOF/COFF obj file to PIC(shellcode). by golang☆39Sep 28, 2022Updated 3 years ago
- 32 bit process inject shellcode to 32 bit process and 64 bit process☆35May 8, 2023Updated 2 years ago
- Explorer Persistence technique : Hijacking cscapi.dll order loading path and writing our malicious dll into C:\Windows\cscapi.dll , when …☆83Jan 12, 2023Updated 3 years ago
- HEVD Exploits for fun and learning.☆15Aug 30, 2025Updated 6 months ago
- BadUSB ile Penetrasyon☆13Jun 15, 2019Updated 6 years ago
- ☆14Sep 23, 2021Updated 4 years ago
- ☆10Sep 3, 2021Updated 4 years ago
- PassWord List Maker☆17Oct 29, 2018Updated 7 years ago
- Get value from *map[string]interface{}* easier☆12Feb 13, 2020Updated 6 years ago
- Go ransomware leveraging ChaCha20 and ECIES encryption with a web-based control panel.☆46Apr 27, 2025Updated 10 months ago