tbabej / uadtLinks
User action detection toolkit. Spy on mobile phone apps using machine learning-based attacks on the encrypted traffic.
☆11Updated 6 years ago
Alternatives and similar repositories for uadt
Users that are interested in uadt are comparing it to the libraries listed below
Sorting:
- A Shell script written to simplify aircrack-ng. Basically made for newbies.☆12Updated 9 years ago
- Most powerfull Wifi Jammier.with fixes.☆12Updated 3 years ago
- Espia trafico de la red NETSPY.sh ( hackingyseguridad.com )☆22Updated 9 months ago
- How to hack webcams☆10Updated 4 years ago
- this project is a smart sniffer made by BlackDOS team☆11Updated 8 years ago
- A GUI version of the PhoneSpoit CLI tool.☆15Updated last year
- Crack ios Restriction PassCode in Python☆38Updated 5 years ago
- iOS forensic tool☆64Updated 11 years ago
- Deauth and Beacon Spammer Script with Multiple functions.☆13Updated 5 years ago
- Get your USB Rubber Ducky up and running faster☆46Updated 8 years ago
- This is a project for the Rawls Information Security Association's Malware Research Committee. InstaBot was created as a proof of concept…☆15Updated 7 years ago
- Detects near-by devices such as cell phones, tablets, and laptops. Does this through 802.11, Bluetooth, cell phone protocols, etc..☆18Updated 11 years ago
- Some scripts to do a ping of death attack.☆11Updated 8 years ago
- Using Kali on Raspberry Pi 4 for basic aircrack tools☆23Updated 4 years ago
- A very powerful tool for All kind of MITM attacks☆15Updated 2 years ago
- Silently logs and E-mails all incoming/outgoing calls and text messages while doubling up as a flashlight app. The app also has the abili…☆24Updated 4 years ago
- A tool to uncover hidden SSIDs☆13Updated 6 years ago
- WiFi HID Injector - An USB Rubberducky / BadUSB On Steroids.☆27Updated 8 years ago
- ☆16Updated 8 years ago
- A program that does Deauthentication Attack on every nearby wireless device☆31Updated 6 years ago
- Phishing can't get any easier with Tilapia☆11Updated 3 years ago
- WiFi-Jammer/DoS toolset☆61Updated 5 years ago
- Bypassing Android Pattern Lock☆69Updated 11 years ago
- Tutorial to create a bootable Kali USB drive with persistent storage.☆10Updated 8 years ago
- BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be us…☆59Updated 8 years ago
- Sms spoof☆10Updated 9 months ago
- A pure python, post-exploitation, remote administration tool (RAT) for macOS / OS X.☆48Updated 8 years ago
- Priv8 Image Capturing through Network Based On Driftnet☆24Updated 7 years ago
- A python tool that will extract exif data from picture with two methods☆39Updated 4 years ago
- Auxile Framework☆28Updated 5 years ago