svasapolle's Stars
n1nj4sec/pupy
Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) C2 and post-exploitation framework written in python and C
AhMyth/AhMyth-Android-RAT
Android Remote Administration Tool
offensive-security/kali-nethunter
The Kali NetHunter Project
offensive-security/exploitdb-bin-sploits
The legacy Exploit Database repository - New repo located at https://gitlab.com/exploit-database/exploitdb-bin-sploits
DesignativeDave/androrat
Remote Administration Tool for Android devices
termux/proot
An chroot-like implementation using ptrace.
OpenSecurityResearch/hostapd-wpe
Modified hostapd to facilitate AP impersonation attacks
offensive-security/nethunter-app
NetHunter android application
Adobe-Marketing-Cloud/mobile-services
⛔️ Deprecated ⛔️ These SDKs are no longer supported by Adobe. Please see Adobe Experience Platform Mobile SDKs for current and supported versions.
getsecnow/instagram-py
Simple Instagram brute force script written in python
ruleonplanet/icloudbypass
How to bypass iCloud activation from iPhone, iPad and iPod when DoulCi is available for 4,4s,5,5c,5s [Tutorial] How to bypass iCloud activation from iPhone, iPad and iPod when DoulCi is available Hello people! I’m writing a quick and easy guide for people who do not know how to unlock their device using the DoulCi Server. This article will also be updated with the new DoulCi’s ip, when available and online! We can start: FOR WINDOWS USERS You need to edit your “hosts” file which is located underC:\Windows\System32\Drivers\etc directory.edithosts Edit your hosts file with an Text Editor (example NotePad++) and add this red marked text as show in image below xxx.xxx.xx.xx albert.apple.com (change xxx value with the new DoulCi ip wrote below) after save file.notepadhosts On your iDevice follow the activation steps until the message of iCloud Activation Lock appears.iphoneactivationlock Open iTunes and Plug your iDevice on the USB port.plugiphone You’ll be asked by iTunes to accept unsecured albert in the middle of the process. Just accept that (it’s important). When you got an error on iTunes, click OK, and finish the activation steps on your device. Finish the activation on your iDevice and re-plug the device again so it can be recognized by iTunes. FOR MAC USERS Open Applications and going on Utility and open Terminal Appopenterminal When you are on terminal app write this command: sudo nano /private/etc/hosts and write your system passwordsudo nano hosts Now you are able to edit hosts file, you can move in with the arrows of keyboard and write the ip of DoulCi (ex. xxx.xxx.xx.x albert.apple.com)edit hosts When you have finished editing it to save press ctrl + o and for exit from editing ctrl + xfinished editing hosts sudo nano Follow from 3th Step of Windows Users Tutorial This is all, you have bypassed iCloud Activation lock! :-) For more information visit all our last posts
jcadduono/android_kernel_samsung_klte
Kali NetHunter Kernel for LineageOS on Samsung Galaxy S5
JonathanBeck/libopensync-plugin-iphone
An OpenSync plugin to allow syncing with the iPhone
svasapolle/libopensync-plugin-iphone
An OpenSync plugin to allow syncing with the iPhone
svasapolle/airgeddon
This is a multi-use bash script for Linux systems to audit wireless networks.
svasapolle/androrat
Remote Administration Tool for Android devices
svasapolle/AtEar
Wireless Hacking, WiFi Security, Vulnerability Analyzer, Pentestration
svasapolle/kali-nethunter
The Kali NetHunter Project
svasapolle/nethunter-app
NetHunter android application
svasapolle/nethunter-devices
NetHunter Devices
svasapolle/nethunter_kernel_klte
Kali NetHunter Kernel for CyanogenMod on Samsung Galaxy S5
svasapolle/proot
An chroot-like implementation using ptrace.
svasapolle/pupy
Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) remote administration and post-exploitation tool mainly written in python
svasapolle/social-engineer-toolkit
The Social-Engineer Toolkit (SET) repository from TrustedSec - All new versions of SET will be deployed here.
svasapolle/wifiphisher
Automated victim-customized phishing attacks against Wi-Fi clients