Run interactive android exploits in linux.
☆149Feb 11, 2025Updated last year
Alternatives and similar repositories for Andspoilt
Users that are interested in Andspoilt are comparing it to the libraries listed below
Sorting:
- Captive wifi hotspot bypass tool for Linux☆65Jan 17, 2019Updated 7 years ago
- A collection of android Exploits and Hacks☆967Oct 8, 2019Updated 6 years ago
- pentesting tool for noob hackers.Runs on linux and termux☆69Sep 2, 2021Updated 4 years ago
- Generate customized Password/Passphrase wordlist based on target information☆97Feb 27, 2026Updated last week
- NoSQL Injection Tool to bypass login forms & extract usernames/passwords using regular expressions.☆30Nov 9, 2021Updated 4 years ago
- A forensic analysis framework for enumerating slack artifacts residing in the Operating system.☆18Sep 23, 2025Updated 5 months ago
- Another vulnerability scanner☆18Aug 9, 2025Updated 6 months ago
- A ZAPROXY Add-on that allows testing of web application vulnerabilities by recording complex multi-step sequences. You can test applica…☆22May 14, 2025Updated 9 months ago
- A simple command line tool designed to explore the mechanics of dictionary attacks on the FTP protocol.☆19Jun 16, 2021Updated 4 years ago
- An exotic service bruteforce tool.☆13Apr 12, 2025Updated 10 months ago
- 🐚ᴠʟᴀɴɢ ʀᴇᴠᴇʀsᴇ sʜᴇʟʟ🐚☆11Apr 28, 2022Updated 3 years ago
- Yet another web recon tool☆61Aug 9, 2023Updated 2 years ago
- trolo - an easy to use script for generating Payloads that bypasses antivirus☆52Feb 28, 2017Updated 9 years ago
- This script was developped to assist in SpearPhishing campaign during Red Team operations. It can be used to generate random name based o…☆13Feb 6, 2023Updated 3 years ago
- CVE-2019-1064 Local Privilege Escalation Vulnerability☆11Jun 12, 2019Updated 6 years ago
- Post-Exploitation module for Penetration Tester and Hackers.☆27Dec 29, 2021Updated 4 years ago
- Sifter - All purpose penetration testing op-center☆82Nov 23, 2022Updated 3 years ago
- Automated rogue access point setup tool.☆204Apr 2, 2021Updated 4 years ago
- Web-based GUI for TorBox☆19Jun 13, 2023Updated 2 years ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆14May 15, 2019Updated 6 years ago
- ☆12Sep 22, 2022Updated 3 years ago
- Fast exploitation based on metasploit.☆74Dec 28, 2019Updated 6 years ago
- Advanced Android AV Evasion Tool Written In Python 3 that can Embed/Bind meterpreter APK to any Legitimate APK☆295May 15, 2024Updated last year
- PRECISELY PINPOINT PEDO LOCATION THROUGH THE ART OF SOCIAL ENGINEERING☆26Apr 10, 2025Updated 10 months ago
- Chrome Keylogger Extension | Post Exploitation Tool☆440Apr 26, 2022Updated 3 years ago
- Gmail shell, for hackers execute commands via gmail☆19Feb 3, 2021Updated 5 years ago
- A new binary injection technique, can easily go through any #CIG protected process and slip through all possible defenses without any inj…☆18Mar 8, 2018Updated 7 years ago
- Hacking Wifi-Passwords,Chrome-Saved-Passwords,Copying the Scripts to Windows-Startup folder,Index-Sites-Files-Downloader☆30Dec 15, 2017Updated 8 years ago
- simple script to pwn android phone with physical access☆27Dec 22, 2018Updated 7 years ago
- ☆13Apr 1, 2017Updated 8 years ago
- Admin Panel Finder☆16Jan 25, 2022Updated 4 years ago
- Hack accounts and passwords on Asterisk servers☆17Mar 16, 2015Updated 10 years ago
- Modular penetration testing platform that enables you to write, test, and execute exploit code.☆320Dec 1, 2024Updated last year
- Simple backdoor for public places, that uses a file system for communication. Just for fun! 😈☆54Nov 27, 2019Updated 6 years ago
- A framework for pentesters that facilitates evil twin attacks as well as exploiting other wifi vulnerabilities☆338Aug 1, 2024Updated last year
- Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device.☆3,291Nov 1, 2025Updated 4 months ago
- Hitman - A tool for reliable TCP/IP communication and detection in the presence of on-path connection reset censorship technologies and f…☆17Dec 23, 2019Updated 6 years ago
- Escalation Servers and Scripts for Priv Escalation☆18Jul 20, 2019Updated 6 years ago
- Handshake cracker☆52May 6, 2023Updated 2 years ago