The SSDP engine in Firefox for Android (68.11.0 and below) can be tricked into triggering Android intent URIs with zero user interaction.
☆10Jan 27, 2023Updated 3 years ago
Alternatives and similar repositories for FFSSDP-MITM
Users that are interested in FFSSDP-MITM are comparing it to the libraries listed below
Sorting:
- Turn your Kali NetHunter phone into a brute-force PIN cracker for screen locked Android devices☆307Jan 27, 2023Updated 3 years ago
- A simple yet powerful OTP SMS and Call flooding script for Linux-based terminals using Bash Scripting, with unlimited sending capability.☆173Aug 7, 2025Updated 7 months ago
- Man in the browser attack is all about stealing credentials from sites running in internet-explorer by forcing user to logout and then ag…☆11Feb 17, 2023Updated 3 years ago
- A free to use OTP & Call flooding android application with unlimited sending capability.☆228Sep 11, 2025Updated 6 months ago
- Converts C programs that only use syscalls to 64 bit assembly file.☆12Mar 7, 2021Updated 5 years ago
- This repo contain Android malware samples and analysis☆13Apr 3, 2021Updated 4 years ago
- This is a opensource repo about how to detect android malware using Random Forest Classifier and explain it use linearsvc.☆12Feb 7, 2024Updated 2 years ago
- Use comboclean to make it easy to use email and passwords, from big combolists, in your script.☆15Aug 27, 2021Updated 4 years ago
- 😈✨ URLSp00f is an URL Spoofing/Shortening T00L (Helpful in Social-3ngineering Att4cks)☆15Mar 23, 2022Updated 3 years ago
- Twitter video downloader with background download notification (Flutter)☆13Jul 15, 2022Updated 3 years ago
- Unity Based Menu Maker for Android, PC Games!☆14Aug 11, 2018Updated 7 years ago
- Use the same module system that leverages NixOS to configure your emacs customization☆11Aug 6, 2022Updated 3 years ago
- Remote Code Execution vulnerability on ArcSight Logger☆20Jan 24, 2021Updated 5 years ago
- Eclectic ICS (Industrial Control Systems) Resources & References☆16May 7, 2021Updated 4 years ago
- sys-module to remote controll your nintendo switch and build automated bots/applications using http☆21Apr 28, 2022Updated 3 years ago
- Derrick is an advanced data leak scanning and CVE vulnerability analysis tool, designed for cybersecurity researchers and digital defense…☆32Mar 6, 2025Updated last year
- GMS-Sploit GhostManSec - Hacking Tool - 8 method hacking - GhostManS3c-Sploit v1.2-dev☆25Aug 13, 2023Updated 2 years ago
- Useful OSINT tools☆40Apr 26, 2024Updated last year
- Docker container to use blutter (dart decompiler for android apps)☆22Sep 18, 2024Updated last year
- ⚡ FutureGPT - Application development framework that connects GPT-4 with external data, the internet, other applications and language mod…☆12May 14, 2023Updated 2 years ago
- A steganography based shellcode hider to bypass AV☆17Aug 7, 2022Updated 3 years ago
- Recovery Builder for TWRP, SHRP, Orangefox (OFOX), PBRP☆31Mar 1, 2026Updated 3 weeks ago
- ☆14Feb 12, 2026Updated last month
- ☆22Nov 12, 2022Updated 3 years ago
- ☆18Aug 13, 2020Updated 5 years ago
- Python script attack all social media accounts☆20Jul 5, 2023Updated 2 years ago
- An improved version of Sublist3r, a python based Fast subdomains enumeration tool for penetration testers☆10Feb 10, 2024Updated 2 years ago
- IR remote control for my Car PC. Emulates keyboard and mouse USB HID Combo device.☆10Jan 30, 2016Updated 10 years ago
- Persistent USB & VirtualBox NixOS System Configuration Files☆10Dec 29, 2014Updated 11 years ago
- Tool to bruteforce Windows LDAP, Kerberos, RDP, SSH, FTP, HTTP basic and digest authentication☆28Dec 31, 2024Updated last year
- smod is a modular framework with every kind of diagnostic and offensive feature you could need in order to pentest modbus protocol☆19May 2, 2019Updated 6 years ago
- A Python, Boto3 script that leverages a forensic volume to attach & mount to a selected instance, run a memory dump, unmount and detach f…☆12Jul 15, 2020Updated 5 years ago
- Control your computer with Leapmotion. :)☆21Feb 5, 2014Updated 12 years ago
- web editor for nix files. edit nixos configuration in a graphical webinterface☆11Sep 12, 2022Updated 3 years ago
- GUI wireless 802.11 penetration tool☆12Oct 7, 2016Updated 9 years ago
- instagram bulk profile media downloader - scrape from picuki.com☆24Jun 22, 2025Updated 9 months ago
- An experimental shell that handles file exfiltration, exploit injection and various other obnoxious tasks.☆14Aug 9, 2020Updated 5 years ago
- Hardening your OS/Profile is like building with LEGO, incorporating a couple of Grsecurity features and implementing aggressive security …☆21Nov 24, 2025Updated 3 months ago
- NixOS configuration of my machines☆12Updated this week