Skip to content
View vsa77's full-sized avatar
  • 17:09 (UTC -05:00)
Block or Report

Block or report vsa77

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse

Popular repositories Loading

  1. Android-PIN-Bruteforce Android-PIN-Bruteforce Public

    Forked from urbanadventurer/Android-PIN-Bruteforce

    Unlock an Android phone (or device) by bruteforcing the lockscreen PIN. Turn your Kali Nethunter phone into a bruteforce PIN cracker for Android devices! (no root, no adb)

    Shell 1

  2. cve-2019-2215 cve-2019-2215 Public

    Forked from DimitriFourny/cve-2019-2215

    Android privilege escalation via an use-after-free in binder.c

    C

  3. CVE-2020-12753-PoC CVE-2020-12753-PoC Public

    Forked from shinyquagsire23/CVE-2020-12753-PoC

    A proof-of-concept for CVE-2020-12753

    Python

  4. atcmd atcmd Public

    Forked from FICS/atcmd

    Android AT command scripts and firmware extraction

    Shell

  5. username-anarchy username-anarchy Public

    Forked from urbanadventurer/username-anarchy

    Username tools for penetration testing

    Ruby

  6. EMAGNET EMAGNET Public

    Forked from daab0x/EMAGNET

    Emagnet is a very powerful tool for it's purpose wich is to capture email addresses and especially leaked databases uploaded on pastebin.

    Shell