backdoor-apk is a shell script that simplifies the process of adding a backdoor to any Android APK file. Users of this shell script should have working knowledge of Linux, Bash, Metasploit, Apktool, the Android SDK, smali, etc. This shell script is provided as-is without warranty of any kind and is intended for educational purposes only.
☆16Aug 10, 2016Updated 9 years ago
Alternatives and similar repositories for backdoor-apk
Users that are interested in backdoor-apk are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Undetectable Windows Payload Generation☆10Dec 2, 2017Updated 8 years ago
- Interview questions to screen offensive (red team/pentest) candidates☆12Apr 7, 2017Updated 9 years ago
- An inventory of tools and resources about CyberSecurity that aims to help people to find everything related to CyberSecurity.☆13Jan 5, 2021Updated 5 years ago
- The Mobile App Pentest cheat sheet was created to provide concise collection of high value information on specific mobile application pen…☆16Apr 11, 2017Updated 9 years ago
- ☆16May 15, 2020Updated 5 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- File system enumerator and monitor for Android and Ubuntu.☆17Sep 25, 2021Updated 4 years ago
- Example Python code for creating a Bitcoin transaction☆15Jan 25, 2014Updated 12 years ago
- Blackvenom is a python based Script. Blckvenom is an automated tool that can generate payload using metasploit. You can generate payload …☆33Sep 7, 2022Updated 3 years ago
- Randomly changes Win32/64 PE Files for 'safer' uploading to malware and sandbox sites.☆132Oct 30, 2013Updated 12 years ago
- Trying to be the best tool to search for exploits in the terminal.☆12Jul 3, 2017Updated 8 years ago
- Rust-based password mutator for brute force attacks☆13Mar 21, 2025Updated last year
- A restful API for MikroTik RouterOS.☆12Feb 21, 2017Updated 9 years ago
- 💻 Elevate, UAC bypass, privilege escalation, dll hijack techniques☆11Nov 23, 2018Updated 7 years ago
- A collection of hacks and one-off scripts☆11Apr 6, 2020Updated 6 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Use md5-collisions to make evil executables looking like a good one.☆34Apr 23, 2020Updated 6 years ago
- Metasploit Framework☆11Apr 18, 2019Updated 7 years ago
- A Powerful XSS,RXSS,BXSS finding tool☆31Oct 29, 2025Updated 6 months ago
- POC of code that downloads and executes shellcode in memory.☆80May 25, 2014Updated 11 years ago
- Today Plugin (x64) - A Plugin For x64dbg☆13Jul 17, 2018Updated 7 years ago
- An python script that use apkleaks to scan the android application over web☆11Jun 2, 2022Updated 3 years ago
- F5 Service Password Decryption☆29Jul 31, 2025Updated 9 months ago
- A pure-Rust library for VMware host-guest protocol ("VMXh backdoor")☆17Feb 6, 2026Updated 2 months ago
- Framework for in-VM test execution and monitoring, inspired by Sandsifter☆15Apr 14, 2026Updated 3 weeks ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Generate HID attack strings for Kali Nethunter☆12Mar 20, 2015Updated 11 years ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆12May 21, 2024Updated last year
- Ferramenta para criação de payload HID para android sem nethunter e sem rubber ducky☆10Jul 4, 2018Updated 7 years ago
- Broadcom Image Editor tool☆21Oct 3, 2019Updated 6 years ago
- A template for standard Maltego transformation☆14Dec 8, 2021Updated 4 years ago
- Fast Proxy Checker☆18Dec 4, 2024Updated last year
- DuckyLogger: DuckyLogger is a Key Logger which captures every key stroke of traget and send them to attacker.☆10Apr 14, 2022Updated 4 years ago
- trakttv everywhere☆27Mar 31, 2013Updated 13 years ago
- Let's you use any Windscribe server over a HTTP proxy. Uses Docker so multiple HTTP proxies at different locations can be created on the …☆12Jan 4, 2019Updated 7 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Archive the Twitter sample firehose and daily trends☆13Apr 20, 2020Updated 6 years ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆15Apr 5, 2019Updated 7 years ago
- Notes on Kali Linux on Nethunter by hcs0☆12Oct 13, 2019Updated 6 years ago
- terminal customization☆10Dec 17, 2022Updated 3 years ago
- Custom pentesting tools☆16Dec 11, 2019Updated 6 years ago
- Show your Instagram profile on your website. 🌈☆27Jan 13, 2022Updated 4 years ago
- RATs library 2003 to present☆16Oct 14, 2023Updated 2 years ago