Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device.
-
Updated
Apr 24, 2024 - Python
Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device.
ADB For Hackers (:
A Collection of Android (Samsung) Security Research References
whatsapp remote code execution
Android-BackDoor is a python and shell script that simplifies the process of adding a backdoor to any Android APK file. It also exploits the Android Debug Bridge to remotely access an Android device.
Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device.
An Android app which attempts to prevent you from using your device without becoming the administrator.
This is the premium version of the most unique and powerful remote access trojan, Dodgerat.
The mastervirus tool used to crash Whatsapp instagram And android devices and delete the data
PoC for old Binder vulnerability (based on P0 exploit)
Advanced and powerful Android device controlling tool with a wide range of features and capabilities
Phoenix RCU is developed by XenXode, a highly intellectual and resourceful private community of russians and american programming bachelors and security researchers. A software which is well programmed to your needs in the field of remote monitoring and administration.
Android ADB Exposed Tool - Connect to Android where ADB is exposed to the internet
Advanced and powerful Android device controlling tool with a wide range of features and capabilities
Smart Hack World
About A modified, bug-fixed, and feature-enhanced version of the discontinued open-source Android remote administration tool AhMyth RAT. Experience the extended capabilities and improved performance in this revamped edition.
888 RAT 1.3.0 have All feature of 1.2.6 and More
SilentSpy Android RAT Tool
Add a description, image, and links to the android-exploit topic page so that developers can more easily learn about it.
To associate your repository with the android-exploit topic, visit your repo's landing page and select "manage topics."