19 programs for "android attack" with 1 filter applied:

  • Award-winning proxy networks, AI-powered web scrapers, and business-ready datasets for download.
 Icon
    Bright Data is a leading data collection platform, enabling businesses to collect crucial structured and unstructured data from millions of websites through our proprietary technology. Our proxy networks give you access to sophisticated target sites using precise geo-targeting. You can also use our tools to unblock tough target sites, accomplish SERP-specific data collection tasks, manage and optimize your proxy performance as well as automating all of your data collection needs.
  • Fully managed relational database service for MySQL, PostgreSQL, and SQL Server Icon
    Fully managed relational database service for MySQL, PostgreSQL, and SQL Server

    Focus on your application, and leave the database to us

    Cloud SQL manages your databases so you don't have to, so your business can run without disruption. It automates all your backups, replication, patches, encryption, and storage capacity increases to give your applications the reliability, scalability, and security they need.
  • 1
    Brook

    Brook

    Brook is a cross-platform strong encryption and not detectable proxy

    .../Windows/iOS/Android are all GUIs. Usually, if you use Brook, you will need a combination of Server and Client, Of course Brook CLI also has many other independent functions. The Brook CLI file is an independent command file, it can be said that there is no concept of installation, just download this file to your computer, run it after granting it executable permissions in the command line interface.
    Downloads: 31 This Week
    Last Update:
    See Project
  • 2
    Proxyman

    Proxyman

    Web Debugging Proxy for macOS, iOS, and Android

    Don't let cumbersome web debugging tools hold you back. With Proxyman's native macOS app, you can capture, inspect, and manipulate HTTP(s) traffic with ease. Intuitive, thoughtful, built with meticulous attention to detail. Comprehensive Guideline to set up with iOS simulator and iOS and Android devices. Proxyman acts as a man-in-the-middle server that capture the traffic between your applications and SSL Web Server. With built-in macOS setup, so you can inspect your HTTP/HTTPS Request...
    Downloads: 3 This Week
    Last Update:
    See Project
  • 3
    Udp2raw-tunnel

    Udp2raw-tunnel

    Turns UDP traffic into encrypted UDP/fakeTCP/ICMP traffic

    A tunnel which turns UDP traffic into encrypted fakeTCP/UDP/ICMP traffic by using Raw Socket, helps you bypass UDP FireWalls(or unstable UDP environment). When used alone, Udp2raw tunnels only UDP traffic. Nevertheless, if you used udp2raw + any UDP-based VPN together, you can tunnel any traffic(include TCP/UDP/ICMP), currently, OpenVPN/L2TP/ShadowVPN and tinyfecVPN are confirmed to be supported. Linux host (including desktop Linux,Android phone/tablet,OpenWRT router,or Raspberry PI) with root...
    Downloads: 5 This Week
    Last Update:
    See Project
  • 4
    Tamper Dev

    Tamper Dev

    Extension that allows you to intercept and edit HTTP/HTTPS requests

    If you are a developer, you can use Tamper Dev to debug your websites, or if you are a pentester, you can use it to search for security vulnerabilities by inspecting the HTTP traffic from your browser. Unlike most other extensions, Tamper Dev allows you to intercept, inspect and modify the requests before they are sent to the server. This extension provides functionality similar to Burp Proxy, MITM Proxy, OWASP ZAP, Tamper Data, and Postman Proxy, but without the need of additional software,...
    Downloads: 4 This Week
    Last Update:
    See Project
  • DriveStrike: Remote Wipe | Data Breach Protection Icon
    DriveStrike: Remote Wipe | Data Breach Protection

    . From Fortune 500 to small businesses with remote workers, every industry can gain from premium endpoint security.

    DriveStrike protects devices and data in the event of loss, theft, or use in remote locations. Remotely locate, lock, and wipe devices you manage to prevent data compromise. DriveStrike prevents data breaches to ensure confidentiality, compliance, and a competitive edge.
  • 5
    Stephino RPG

    Stephino RPG

    The first-ever RPG for WordPress

    ... in order to uncover the history of your species. You can form cities, attack and spy on other players and robots, send resources between cities, complete research activities and use premium modifiers to boost your gameplay. Create your own platformer mini-games and play games created by others to earn rewards. Unlock the game to create your own designs and themes and re-define the rules of the game.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    Zynix-Fusion

    Zynix-Fusion

    zynix-Fusion is a framework for hacking

    zynix-Fusion is a framework that aims to centralize, standardizeand simplify the use of various security tools for pentest professionals.zynix-Fusion (old name: Linux evil toolkit) has few simple commands, one of which is theinit function that allows you to define a target, and thus use all the toolswithout typing anything else.
    Downloads: 12 This Week
    Last Update:
    See Project
  • 7
    Bat Attack

    Bat Attack

    Bat Attack is a cool classical 8bit game to save wife from the Bats

    Bat Attack is a cool classical 8bit game with bats instead and a lot of comic blood and gore and comical media with a funny story mode. The story starts when the main character 'Dave' is driving on his honeymoon with his wife Betty when an Evil bat swoops down and take his dearly beloved off. You have to get Betty back by using the guns available to your disposable. When the bats are killed they make a mess all over the ground and sometimes drop weapons they have devoured. There are three...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    PGIIXUA

    PGIIXUA

    PGIIXUA allows to generate network traffic right of your Android

    PGIIXUA allows to generate network traffic right of your Android smartphone. THERE ARE NO VIRUSES, THE SYSTEM JUST DETECTS SUCH TOOLS THAT WAY! Malware detected (wanted feature): 'a variant of Android/HackTool.Loicdos.B application': What does it mean? This tool is based on the 'Low Orbit Ion Canon', but more powerful as for the advanced changes that were made on the software. What is Low Orbit Ion Canon? Low Orbit Ion Cannon (LOIC) is an open-source network stress testing and denial...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Wi-PWN

    Wi-PWN

    ESP8266 firmware for performing deauthentication attacks

    ESP8266 firmware for performing deauthentication attacks, with ease. Wi-PWN is a firmware that performs death attacks on cheap Arduino boards. The ESP8266 is a cheap microcontroller with built-in Wi-Fi. It contains a powerful 160 MHz processor and it can be programmed using Arduino. A deauthentication attack is often confused with Wi-Fi jamming, as they both block users from accessing Wi-Fi networks. The 802.11 Wi-Fi protocol contains a so-called deauthentication frame. It is used to disconnect...
    Downloads: 9 This Week
    Last Update:
    See Project
  • The Most Comprehensive and Secure Experience Management Platform Icon
    SoGoSurvey is a web-based experience management platform that helps clients improve customer experience, collect product feedback, and grow employee engagement. It brings special focus to data security and data insights. Both powerful and easy to use, SoGoSurvey offers 24x7 customer support via phone, chat, and email. SoGoSurvey provides comprehensive features for organizations that treat feedback as a critical part of their business growth.
  • 10
    Online Zombie Game

    Online Zombie Game

    Online Zombie Game is a medieval-zombie apocalypse rpg game.

    Online Zombie Game. Control your character through medieval zombie apocalypse! * You have 4 attributes (Health,Attack,Defence,Critical Rate) * Train your character to get stronger. * Hunt in 11 different areas to get experience,golds,diamonds. * 50+ zombie types with different attributes. * Flexible choice of hunting time. (From 1 minute to 8 hours!) * Challange other players in the Arena , get weekly rewards. * Buy weapons/armors to prepare for fight. * Upgrade your trading ship...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    Revenssis Ethical Hacking Suite

    Revenssis Ethical Hacking Suite

    Fully featured network, wireless and web app pentesting suite.

    Nicknamed as the "Smartphone Version of Backtrack", Revenssis Penetration Suite is a set of all the useful types of tools used in Computer and Web Application security. Tools available in it include: Web App scanners, Encode/Decode & Hashing tools, Vulnerability Research Lab, Forensics Lab, plus the must-have utilities (Shell, SSH, DNS/WHOIS Lookup, Traceroute, Port Scanner, Spam DB Lookup, Netstat... etc). All these fitting in an application approx. 10MB (post installation).
    Downloads: 14 This Week
    Last Update:
    See Project
  • 12

    PyLoris

    A protocol agnostic application layer denial of service attack.

    PyLoris is a scriptable tool for testing a server's vulnerability to connection exhaustion denial of service (DoS) attacks. PyLoris can utilize SOCKS proxies and SSL connections, and can target protocols such as HTTP, FTP, SMTP, IMAP, and Telnet.
    Leader badge
    Downloads: 124 This Week
    Last Update:
    See Project
  • 13
    DroidVulMon

    DroidVulMon

    This project is to monitor vulnerability of Android based smartphone

    This project is to monitor vulnerability of Android based smartphone by collecting user's events activated inside of mobile smart work devices. We want to develop an Android Vulnerability Monitoring system (DroidVulMon) by collecting and aggregate diverse events activated from user's mobile device for detecting malicious attacks such as mobile exploits. We provide open source S/W with overall common modules such as collecting events and detecting malicious events.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    OpenSE(Open Secure Encoder)

    OpenSE(Open Secure Encoder)

    OpenSE - Secure your online transactions today!!

    Secure Encoder is a digital secure channel which provides a way to identify yourself. For instance, you can log to your email account by filling the username and password. But, is it safety? Your email account can be stolen by the hackers. Your computer's may suffer from the virus, trojan, key logger, rootkit or phishing attack, and all of your email contents are exposed. For which applications support the Secure Encoder, you are required to input the pin number which generates from...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    Tower of Zaldagor

    Tower of Zaldagor

    The classic intelligent role playing game

    Tower of Zaldagor is a roleplaying game (RPG) where you need to use your wits and skills to complete challenges. Blade Kahn, a king of Sonthalas, has lost his daughter to the Great White Dragon: Zaldagor. She has been kidnapped by humanoids. You have been picked among the elite to return his daugther safely. Engage into an epic story where Gods change the future and demons interfere with the present. Download and discover the beginning of an epic story. The Android version is now available...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    Mobile strategy web-based game

    Mobile strategy web-based game

    A simple mobile strategy web-based game

    _A game based on Webgame that is played over the Internet using Web Browser, Iphone and Android Phone. _It is a massively multi-player real-time strategy webgame set in a VietNam war from 111 BC to 602. Players take on the role of a general or a king from a secluded land and build their resources, build army and attack castles, villages of another players. _This game has 2 versions: iOS and Android
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Galaxy Domination
    A free android game. Conquiers the galaxy by destroying ennemis. Each planet you control create ships for your army. Send your ships attack other planets to dominate the galaxy. Download the GalaxyDomination.apk file to install in your android.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    A sidescrolling game for the android plattform. As a submarine commander you must stay alive while other ships attack you.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    Quick-Safe

    Quick-Safe

    Generate strong and secure passwords with QuickSafe ,

    QuickSafe is an open-source password generator designed to bolster online security by generating robust and secure passwords. This project addresses the growing need for enhanced password strength in the face of escalating cyber threats. QuickSafe empowers users to create highly secure passwords through a diverse character set, including uppercase and lowercase letters, numbers, symbols, and more. With the increasing frequency of online security breaches, having a reliable password generator...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next