{"id":15034536,"url":"https://github.com/entysec/ghost","last_synced_at":"2025-04-09T22:15:14.674Z","repository":{"id":37724715,"uuid":"225918779","full_name":"EntySec/Ghost","owner":"EntySec","description":"Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device.","archived":false,"fork":false,"pushed_at":"2024-09-20T14:08:09.000Z","size":451,"stargazers_count":2997,"open_issues_count":2,"forks_count":978,"subscribers_count":193,"default_branch":"main","last_synced_at":"2025-04-09T22:15:09.003Z","etag":null,"topics":["adb","android","android-debug-bridge","android-device","android-exploit","android-hack","android-hacking","android-rat","backdoor","entysec","exploit","exploitation-framework","hack","hacking","hacking-tools","kali-linux","post-exploitation","rat","remote-access","remote-shell"],"latest_commit_sha":null,"homepage":"https://entysec.com","language":"Python","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":"mit","status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/EntySec.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":"CONTRIBUTING.md","funding":null,"license":"LICENSE","code_of_conduct":"CODE_OF_CONDUCT.md","threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null,"governance":null,"roadmap":null,"authors":null,"dei":null,"publiccode":null,"codemeta":null},"funding":{"github":"entysec"}},"created_at":"2019-12-04T17:13:49.000Z","updated_at":"2025-04-09T21:36:56.000Z","dependencies_parsed_at":"2024-06-03T13:02:31.987Z","dependency_job_id":"62141040-83c6-42e7-9694-b92207279ed8","html_url":"https://github.com/EntySec/Ghost","commit_stats":null,"previous_names":[],"tags_count":0,"template":false,"template_full_name":null,"repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/EntySec%2FGhost","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/EntySec%2FGhost/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/EntySec%2FGhost/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/EntySec%2FGhost/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/EntySec","download_url":"https://codeload.github.com/EntySec/Ghost/tar.gz/refs/heads/main","host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":248119290,"owners_count":21050755,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["adb","android","android-debug-bridge","android-device","android-exploit","android-hack","android-hacking","android-rat","backdoor","entysec","exploit","exploitation-framework","hack","hacking","hacking-tools","kali-linux","post-exploitation","rat","remote-access","remote-shell"],"created_at":"2024-09-24T20:25:25.642Z","updated_at":"2025-04-09T22:15:14.653Z","avatar_url":"https://github.com/EntySec.png","language":"Python","readme":"\u003ch3 align=\"center\"\u003e\n    \u003cimg src=\"https://user-images.githubusercontent.com/54115104/116760735-6da1e780-aa1e-11eb-8c6f-530386487671.png\" alt=\"logo\" height=\"250px\"\u003e\n\u003c/h3\u003e\n\n\u003cp align=\"center\"\u003e\n    \u003cb\u003eGhost Framework\u003c/b\u003e\n    \u003cbr\u003e\n    \u003cbr\u003e\n    \u003ca href=\"https://entysec.com\"\u003e\n        \u003cimg src=\"https://img.shields.io/badge/developer-EntySec-blue.svg\"\u003e\n    \u003c/a\u003e\n    \u003ca href=\"https://github.com/EntySec/Ghost\"\u003e\n        \u003cimg src=\"https://img.shields.io/badge/language-Python-blue.svg\"\u003e\n    \u003c/a\u003e\n    \u003ca href=\"https://github.com/EntySec/Ghost/forks\"\u003e\n        \u003cimg src=\"https://img.shields.io/github/forks/EntySec/Ghost?style=flat\u0026color=green\"\u003e\n    \u003c/a\u003e\n    \u003ca href=\"https://github.com/EntySec/Ghost/stargazers\"\u003e\n        \u003cimg src=\"https://img.shields.io/github/stars/EntySec/Ghost?style=flat\u0026color=yellow\"\u003e\n    \u003c/a\u003e\n    \u003ca href=\"https://www.codefactor.io/repository/github/entysec/ghost\"\u003e\n        \u003cimg src=\"https://www.codefactor.io/repository/github/entysec/ghost/badge\"\u003e\n    \u003c/a\u003e\n    \u003cbr\u003e\n    \u003cbr\u003e\n    Ghost Framework is an Android post-exploitation framework that\n    \u003cbr\u003eexploits the Android Debug Bridge to remotely access an Android device.\n    \u003cbr\u003e\n    \u003cbr\u003e\n    \u003cb\u003eInstallation\u003c/b\u003e\u003cbr\u003e\n    \u003cbr\u003e\n    \u003ccode\u003epip3 install git+https://github.com/EntySec/Ghost\u003c/code\u003e\n\u003c/p\u003e\n","funding_links":["https://github.com/sponsors/entysec"],"categories":[],"sub_categories":[],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fentysec%2Fghost","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Fentysec%2Fghost","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fentysec%2Fghost/lists"}