Run interactive android exploits in linux.
☆152Feb 11, 2025Updated last year
Alternatives and similar repositories for Andspoilt
Users that are interested in Andspoilt are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Reverse/ Bind Shell Generator for cross platform systems☆17Sep 2, 2018Updated 7 years ago
- Captive wifi hotspot bypass tool for Linux☆67Jan 17, 2019Updated 7 years ago
- A collection of android Exploits and Hacks☆981Oct 8, 2019Updated 6 years ago
- pentesting tool for noob hackers.Runs on linux and termux☆69Sep 2, 2021Updated 4 years ago
- Generate customized Password/Passphrase wordlist based on target information☆104Feb 27, 2026Updated 2 months ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- An exotic service bruteforce tool.☆13Apr 12, 2025Updated last year
- Android Framework for Exploitation, is a framework for exploiting android based devices☆201Sep 27, 2015Updated 10 years ago
- Another vulnerability scanner☆18Aug 9, 2025Updated 8 months ago
- 🐚ᴠʟᴀɴɢ ʀᴇᴠᴇʀsᴇ sʜᴇʟʟ🐚☆11Apr 28, 2022Updated 4 years ago
- Thefatrat a massive exploiting tool revealed >> An easy tool to generate backdoor and easy tool to post exploitation attack like browser …☆10Jun 6, 2022Updated 3 years ago
- A ZAPROXY Add-on that allows testing of web application vulnerabilities by recording complex multi-step sequences. You can test applica…☆22May 14, 2025Updated 11 months ago
- Gmail shell, for hackers execute commands via gmail☆20Feb 3, 2021Updated 5 years ago
- Hack accounts and passwords on Asterisk servers☆17Mar 16, 2015Updated 11 years ago
- Script that easily creates, signs and AV bypass .apk metasploit reverse_tcp payload.☆19Jun 14, 2020Updated 5 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- A tool for remote ADB exploitation in Python3 for all Machines.☆876Sep 23, 2024Updated last year
- A forensic analysis framework for enumerating slack artifacts residing in the Operating system.☆18Sep 23, 2025Updated 7 months ago
- NoSQL Injection Tool to bypass login forms & extract usernames/passwords using regular expressions.☆30Nov 9, 2021Updated 4 years ago
- A simple command line tool designed to explore the mechanics of dictionary attacks on the FTP protocol.☆19Jun 16, 2021Updated 4 years ago
- Web-based GUI for TorBox☆19Jun 13, 2023Updated 2 years ago
- simple script to pwn android phone with physical access☆27Dec 22, 2018Updated 7 years ago
- A tool that allows you to search for vulnerable android devices across the world and exploit them.☆427Sep 3, 2021Updated 4 years ago
- elliot_on_g0d☆19Jan 24, 2023Updated 3 years ago
- Use Invoke-PSImage to deliver a payload in an Image☆53Jan 4, 2018Updated 8 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- trolo - an easy to use script for generating Payloads that bypasses antivirus☆53Feb 28, 2017Updated 9 years ago
- ☆12Sep 22, 2022Updated 3 years ago
- Complete guides to homebrew and custom firmware for various devices.☆72Apr 15, 2026Updated 3 weeks ago
- Detects near-by devices such as cell phones, tablets, and laptops. Does this through 802.11, Bluetooth, cell phone protocols, etc..☆19Mar 24, 2014Updated 12 years ago
- Post-Exploitation module for Penetration Tester and Hackers.☆28Dec 29, 2021Updated 4 years ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆14May 15, 2019Updated 6 years ago
- Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device.☆3,325Nov 1, 2025Updated 6 months ago
- PRECISELY PINPOINT PEDO LOCATION THROUGH THE ART OF SOCIAL ENGINEERING☆29Apr 10, 2025Updated last year
- Yet another web recon tool☆61Aug 9, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ADB-Toolkit V2 for easy ADB tricks with many perks in all one. ENJOY!☆1,972Aug 18, 2024Updated last year
- Admin Panel Finder☆16Jan 25, 2022Updated 4 years ago
- Sifter - All purpose penetration testing op-center☆83Nov 23, 2022Updated 3 years ago
- A framework which can track any lost/stolen android phone and retrieve important data from the phone like files,contact numbers autonomou…☆15Aug 5, 2015Updated 10 years ago
- CVE-2019-1064 Local Privilege Escalation Vulnerability☆11Jun 12, 2019Updated 6 years ago
- Curated list of public penetration test reports released by several consulting firms and academic security groups☆14Dec 14, 2019Updated 6 years ago
- Fast exploitation based on metasploit.☆74Dec 28, 2019Updated 6 years ago