simple script to pwn android phone with physical access
☆26Dec 22, 2018Updated 7 years ago
Alternatives and similar repositories for android-usb-pwn
Users that are interested in android-usb-pwn are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- People tracker on the Internet: Learn to track the world, to avoid being traced.☆12Jan 2, 2018Updated 8 years ago
- Get files from Android directories☆11Dec 9, 2018Updated 7 years ago
- pure python remote adb scanner + nmap scan module☆22Dec 7, 2018Updated 7 years ago
- Email OSINT and password breach hunting. Use h8mail to find passwords through different breach and reconnaissance services, or the infamo…☆10Jun 12, 2019Updated 6 years ago
- Exploiting Android Devices Running Insecure Remote ADB Service☆20Aug 25, 2018Updated 7 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- How to make a simple IMSI Catcher (Credit: Keld Norman)☆46Feb 24, 2018Updated 8 years ago
- Information Gathering & WebSite ReConnaissance.☆24Feb 8, 2018Updated 8 years ago
- A collection of awesome framework, libraries, learning tutorials, videos, webcasts, technical resources and cool stuff about Social Engin…☆23Jan 1, 2022Updated 4 years ago
- Generate Random Reset Instagram URLs and check if they still valid for a complete account takeover☆12Apr 26, 2022Updated 3 years ago
- Hacker101☆46Aug 14, 2018Updated 7 years ago
- USB accessory with pyusb☆15Mar 31, 2014Updated 12 years ago
- Tool to execute BREACH attack.☆26Jul 27, 2018Updated 7 years ago
- Selective wifi jammer - control who can connect where☆48Sep 12, 2017Updated 8 years ago
- Learn Cyber Security-1 in 30 Days!☆47Jul 11, 2020Updated 5 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Facebook phisher to get password and email of victim.☆30Mar 13, 2018Updated 8 years ago
- A fast & simple bootable GKI kernel flasher for boot image v2 and v3 devices.☆22Apr 19, 2021Updated 4 years ago
- ADBSploit - A tool for Android device exploitation and management via ADB. Connects via USB/IP, controls apps/media/files, and supports F…☆14Apr 5, 2025Updated last year
- 🤖 Telegram Bot API PHP SDK. Lets you build Telegram Bots easily! Supports Laravel out of the box.☆10Jun 1, 2025Updated 10 months ago
- A pyobfuscate fork made specifically to randomize and obfuscate python based payloads☆14Feb 9, 2015Updated 11 years ago
- Metateta Automated Tool For Scanning And Exploiting Network Protocols Using Metasploit☆84Jul 2, 2018Updated 7 years ago
- Advance Google Dorker and Vulnerability Scanner☆50Oct 29, 2018Updated 7 years ago
- PoC exploit for arbitrary file read/write in locked Samsung Android device via MTP (SVE-2017-10086)☆174Jan 2, 2018Updated 8 years ago
- mkbootfs binary used in Horizon Kernel Flasher☆10Sep 25, 2021Updated 4 years ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- E-ntel is a tool gathering email accounts informations (ip,hostname,country,...) from different public source (search engines, pgp key se…☆30Dec 16, 2018Updated 7 years ago
- A python based tool for exploiting and managing android devices via ADB☆35May 15, 2021Updated 4 years ago
- 💪 Collection of tips, tricks and scripts for becoming a true poweruser☆30Oct 30, 2025Updated 5 months ago
- ☆13Apr 29, 2023Updated 2 years ago
- An automation tool that scans sub-domains, sub-domain takeover and then filters out xss, ssti, ssrf and more injection point parameters.☆12Dec 11, 2020Updated 5 years ago
- Config-Exploiter Dump config.php file from joomla and wordpress websites☆39Sep 30, 2018Updated 7 years ago
- Automatically install all Kali linux tools☆28Jan 16, 2026Updated 3 months ago
- Simple website to automatically generate string encryption/decryption routines for C#☆10Feb 12, 2022Updated 4 years ago
- Magic tool for managing internet connection in local network by @zalexdev☆33Jan 8, 2022Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- CLI Chrome Extension (CRX) Packer written in Python☆16Nov 2, 2013Updated 12 years ago
- edge --> powerpoint --> remote-file --> shell☆12May 17, 2019Updated 6 years ago
- DVR-Exploiter a Bash Script Program Exploit The DVR's Based on CVE-2018-9995☆112Oct 11, 2018Updated 7 years ago
- ☆29Dec 10, 2020Updated 5 years ago
- A collection of awesome lists, manuals, blogs, hacks, one-liners, cli/web tools and more. Especially for System and Network Administrator…☆15Jan 14, 2019Updated 7 years ago
- Exploits locked/password protected computers over USB, drops persistent WebSocket-based backdoor, exposes internal router, and siphons co…☆11Dec 28, 2016Updated 9 years ago
- ☆12Jan 25, 2020Updated 6 years ago