☆20Nov 28, 2022Updated 3 years ago
Alternatives and similar repositories for GrabIT-OTPBOT
Users that are interested in GrabIT-OTPBOT are comparing it to the libraries listed below
Sorting:
- Bypass SMS verifications from Paypal, Instagram, Snapchat, Google, 3D Secure, and many others..☆124Jul 23, 2024Updated last year
- ☆11Oct 20, 2018Updated 7 years ago
- 蜜罐检测工具,支持自动化URL去重、多线程控制及智能速率限制。可识别伪装服务。☆16Jun 5, 2025Updated 8 months ago
- Widget Options – The #1 WordPress Widget & Block Control Plugin <= 4.0.7 - Authenticated (Contributor+) Remote Code Execution☆13Dec 2, 2024Updated last year
- Wordpress Plugin Canto < 3.0.5 - Remote File Inclusion (RFI) and Remote Code Execution (RCE)☆17Nov 24, 2023Updated 2 years ago
- Payload Dropper with Persistance & Privesc & UAC bypass 🐱👤☆14Apr 8, 2024Updated last year
- BlackHat Asia 2025 code and presentations☆18Apr 13, 2025Updated 10 months ago
- ☆13Dec 21, 2023Updated 2 years ago
- فایل ها و فیلم های ورکشاپ ردتیم 2024 با هانت لرن☆32Sep 15, 2024Updated last year
- IndoXploit Webshell V.3☆14Oct 31, 2019Updated 6 years ago
- Bash Shell Script Cryptography☆13Jan 2, 2022Updated 4 years ago
- Use it for need not for revange☆188Feb 20, 2023Updated 3 years ago
- A C# Tool to gather information about email breaches☆16Dec 21, 2023Updated 2 years ago
- FEBREV venom is a RAT generator tool to create Android RATs through metasploit , signs the RAT apk , and sends the RAT apk to the victim…☆16Aug 13, 2019Updated 6 years ago
- ☆19Nov 28, 2024Updated last year
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆18Apr 4, 2023Updated 2 years ago
- Command and Control Framework using powershell implants☆36Jun 17, 2025Updated 8 months ago
- ☆19Aug 26, 2020Updated 5 years ago
- Burp extension used to snip any header from all the requests.☆23Nov 12, 2023Updated 2 years ago
- My shellcodes (or shellcodish-things) written for educational purpose in NASM assembly.☆45Jul 23, 2024Updated last year
- ☆17Jun 14, 2023Updated 2 years ago
- Collection of my own detection rules☆20Jan 6, 2026Updated last month
- Top 400 passwords as per HaveIBeenPwned☆22Oct 14, 2024Updated last year
- Exploits with pwntools library in Python3. ROP, BOF, SHELLCODE.☆20Feb 2, 2024Updated 2 years ago
- Github Search is a quite powerful and useful feature that can be used to search for sensitive data on repositories. Collection of Github …☆21Aug 11, 2024Updated last year
- An OTP bot for telegram☆130Sep 22, 2023Updated 2 years ago
- ☆18Nov 8, 2025Updated 3 months ago
- Awesome Operational Security resources☆47Dec 2, 2016Updated 9 years ago
- Webanator: Webcam scraper written in python that will scrape any countries web cameras.☆22Jan 10, 2026Updated last month
- Collection of rules and debug data for hashcat☆25Dec 2, 2025Updated 3 months ago
- BlueStacks privilege escalation through VM backdooring☆21Jul 16, 2024Updated last year
- Monitor your target continuously for new subdomains!☆25Mar 18, 2023Updated 2 years ago
- Certina is an OSINT tool for red teamers and bug hunters to discover subdomains from web certificate data☆52Mar 7, 2024Updated last year
- A cheatsheet of tools and commands that I use to pentest Active Directory.☆52Mar 26, 2022Updated 3 years ago
- A MBR Fuzzer☆31Apr 3, 2024Updated last year
- aiohttp LFI (CVE-2024-23334)☆27Mar 19, 2024Updated last year
- This repository presents a detailed case study on tracking cryptocurrency transactions and uncovering dark web operations. Using open-sou…☆33Apr 14, 2025Updated 10 months ago
- Atlassian Companion RCE Vulnerability Proof of Concept☆25Dec 15, 2023Updated 2 years ago
- Run you Localhost Server☆27Oct 13, 2024Updated last year