EvilDroid automates the exploitation of CVE-2024-0044, installing malicious payloads on a target device and extracting sensitive data. It features automated ADB connection checks, APK pushing, UID extraction, payload generation, and real-time progress updates, providing a seamless and professional user experience.
☆25Sep 6, 2025Updated 5 months ago
Alternatives and similar repositories for EvilDroid
Users that are interested in EvilDroid are comparing it to the libraries listed below
Sorting:
- Эксплойт для уязвимости CVE-2024-0039 на Android, который позволяет выполнять произвольный код через MP4 файл. Этот репозиторий создан дл…☆12May 29, 2024Updated last year
- Super-Mailer Send Inbox To All☆10Jun 8, 2020Updated 5 years ago
- Powerful WiFi Hacking penetration testing tools for Linux, designed for ethical hacking, security testing, and network auditing.☆16Nov 18, 2025Updated 3 months ago
- Exfiltrate sensitive user data from apps on Android 12 and 13 using CVE-2024-0044 vulnerability remotely☆76Jul 31, 2024Updated last year
- ☆12Jul 4, 2024Updated last year
- POC for CVE-2024-31982: XWiki Platform Remote Code Execution > 14.10.20☆10Jun 22, 2024Updated last year
- ☆12Feb 9, 2025Updated last year
- CounterSocial-Core (AGPLv3)☆10Oct 25, 2021Updated 4 years ago
- Whenever PowerShell is launched, Notepad will also open. You can customize the script for educational purposes, but I emphasize that I do…☆12Apr 21, 2025Updated 10 months ago
- Deepextract : extracts details about activities, services, and broadcast receivers, including their intent actions, custom URL schemes an…☆11Aug 14, 2024Updated last year
- In this repository, you'll find the codebase that accompanies our YouTube tutorial, "Empower Your IoT: Control Devices Anywhere with Goog…☆15Apr 6, 2024Updated last year
- The tool helps in quickly identifying vulnerabilities by examining a comprehensive list of potential paths on a website, making it useful…☆11Mar 24, 2025Updated 11 months ago
- In this tutorial, we delve into creating a powerful real time Chat application using Angular 17 and Supabase. Here is the link to the tut…☆12Apr 22, 2024Updated last year
- Disk Image Mounting Script☆11Jan 22, 2026Updated last month
- ☆10Jun 15, 2024Updated last year
- Worm is an Android post exploitation Framework to gain remote access of any Android device by exploiting Android Debug Bridge.☆14Jun 7, 2024Updated last year
- Custom Queries, Dashboards, and HIPs Rules☆10Jan 13, 2018Updated 8 years ago
- Automated Design of Agentic Systems☆10Sep 7, 2024Updated last year
- CVE-2024-6387 with auto ip scanner and auto expliot☆11Jul 4, 2024Updated last year
- Extract hidden "fastboot oem" commands from firmware blobs☆20Feb 15, 2026Updated 2 weeks ago
- CVE-2024-44000 is a vulnerability in the LiteSpeed Cache plugin, a popular WordPress plugin. This vulnerability affects session managemen…☆15Sep 6, 2024Updated last year
- Repository to track community hardware, data and funding.☆12Apr 8, 2022Updated 3 years ago
- nRF905 Single chip 433/868/915MHz Transceiver Driver for esp-idf☆14Updated this week
- Scripts to for ready-to-use Velociraptor instance deployment in Azure☆14Jun 27, 2023Updated 2 years ago
- 💎 | RubyRedOps is a repository for advanced Red Team techniques and offensive malware, focused on Ruby☆10Apr 21, 2025Updated 10 months ago
- Digispark Overmaster free IDE TOOL allows to create and edit Digispark Scripts by the drag and drop technique,with cool GUI and easy to u…☆13Mar 5, 2023Updated 3 years ago
- Phone Number Gathering & OSINT Tool. Collects Phone Numbers and Performs OSINT on the Numbers. Only works on Nigerian Numbers at the mome…☆14Aug 25, 2020Updated 5 years ago
- A large labeled corpus for Application Privacy Policy in Chinese to train named entity recognition models for Android Dangerous PERMSSION…☆11Jun 19, 2025Updated 8 months ago
- Hunt the windows Registry automatically using VQL☆14Jan 6, 2026Updated last month
- Adds a Spy option to the React Native development menu☆14Jan 2, 2019Updated 7 years ago
- [Pentesting] A Python-based program for Time-based/Blind Remote Code Execution (RCE). The main objective of this program is to extract th…☆17Oct 22, 2024Updated last year
- Useful cyber security and digital forensics resources☆15Oct 20, 2020Updated 5 years ago
- Free iPhone Spy App is a monitoring application that tracks online activities on iPhones and iPad. Now No jailbreak or iCloud solution is…☆13Nov 23, 2021Updated 4 years ago
- Thor Artifacts for Velociraptor☆19Dec 2, 2025Updated 3 months ago
- ☆12May 21, 2025Updated 9 months ago
- 利用 CVE-2024-0044 Android 权限提升下载任意目标App沙箱文件。☆13Sep 3, 2024Updated last year
- ☆18Jun 25, 2024Updated last year
- Enable-All-Tokens is a Go-based project designed to adjust and enable a list of specified privileges for the current process token on a W…☆10Apr 21, 2025Updated 10 months ago
- irCRpull is a PowerShell script utilized to pull several system artifacts, utilizing the free tool CrowdResponse, from a live Win7+ syste…☆14Mar 25, 2015Updated 10 years ago