z448 / pgcheckLinks
check if device contains Pegasus Spyware files
☆39Updated 8 years ago
Alternatives and similar repositories for pgcheck
Users that are interested in pgcheck are comparing it to the libraries listed below
Sorting:
- tools, hacks and stuff for iOS (this is old stuff based on an old iOS version and wasn't tested for functioning on recent iOS devices)☆13Updated 9 years ago
- iOS forensic tool☆65Updated 10 years ago
- Reverse/ Bind Shell Generator for cross platform systems☆19Updated 6 years ago
- Tools for decrypting and hacking iOS systems☆24Updated 12 years ago
- Some useful tools for a iOS Forensics.☆34Updated 6 years ago
- PHP code that is suppose to bypass the icloud server. Still working on errors.☆44Updated 5 years ago
- ☆10Updated 4 years ago
- Phising script of Apple ID verification.☆33Updated 5 years ago
- IOS hacking stuff☆176Updated 12 years ago
- ☆20Updated 11 years ago
- A tool for recover router password☆30Updated 6 years ago
- simple script to pwn android phone with physical access☆25Updated 6 years ago
- Bypassing Android Pattern Lock☆67Updated 11 years ago
- Scripts and tool for iOS app reversing☆25Updated 3 years ago
- Crack ios Restriction PassCode in Python☆32Updated 4 years ago
- Mobile phone PWN tools and scripts☆14Updated 4 years ago
- Payload delivery via URL and some social engineering.☆17Updated 10 months ago
- keylogger sends the login details by email, card number, facebook account,paypal...etc new projet 2020☆17Updated 4 years ago
- Collect Apple ID's straight from Apple's Login Form☆20Updated 8 years ago
- Package manager for hackers built by hackers☆36Updated 6 years ago
- This write-up will provide detailed description on how to bypass Guided Access mode on Apple iPhones.☆19Updated 7 years ago
- A brief analysis of the BlueBorne Vulnerability Scanner app by Armis☆23Updated 7 years ago
- WSLTools☆23Updated 6 years ago
- Cpanel Brute Force Tool (Perl)☆16Updated 11 years ago
- Tutorial to create a bootable Kali USB drive with persistent storage.☆8Updated 8 years ago
- Automatic SQL injection and database takeover tool.☆16Updated 7 years ago
- Security program for recovering passwords and pen-testing servers, routers and IoT devices using brute-force password attacks.☆47Updated last year
- ☆13Updated 4 years ago
- A salty-ass 100% verified hacker status python script to turn apple id's into apple crisp #nicememe☆43Updated 5 years ago
- Sniff every types of files you want on your network interface and save it.☆17Updated 9 years ago