QRLJacking or Quick Response Code Login Jacking is a simple-but-nasty attack vector affecting all the applications that relays on “Login with QR code” feature as a secure way to login into accounts which aims for hijacking users session by attackers.
☆1,523Aug 7, 2025Updated 7 months ago
Alternatives and similar repositories for QRLJacking
Users that are interested in QRLJacking are comparing it to the libraries listed below
Sorting:
- A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks☆1,450Nov 3, 2018Updated 7 years ago
- Phishing Tool & Information Collector☆4,687Oct 29, 2024Updated last year
- Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and et…☆11,086Mar 17, 2024Updated 2 years ago
- Efficient and advanced man in the middle framework☆2,178Mar 23, 2023Updated 2 years ago
- Know the dangers of credential reuse attacks.☆2,102Dec 9, 2025Updated 3 months ago
- Use a Fake image.jpg to exploit targets (hide known file extensions)☆936May 28, 2025Updated 9 months ago
- CredSniper is a phishing framework written with the Python micro-framework Flask and Jinja2 templating which supports capturing 2FA token…☆1,382May 22, 2020Updated 5 years ago
- Android Remote Administration Tool☆5,087Aug 12, 2021Updated 4 years ago
- Attack Surface Management Platform☆9,466Feb 15, 2026Updated last month
- EasySploit - Metasploit automation (EASIER and FASTER than EVER)☆380Jan 29, 2020Updated 6 years ago
- AntiVirus Evasion Tool☆1,747Apr 23, 2025Updated 10 months ago
- backdoor-apk is a shell script that simplifies the process of adding a backdoor to any Android APK file. Users of this shell script shoul…☆2,346Sep 12, 2022Updated 3 years ago
- ☆1,075Jan 13, 2023Updated 3 years ago
- Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's po…☆3,902Jan 24, 2024Updated 2 years ago
- Hacking systems with the automation of PasteJacking attacks.☆399Oct 14, 2024Updated last year
- Th3Inspector 🕵️ Best Tool For Information Gathering 🔎☆2,580Apr 21, 2025Updated 11 months ago
- Exploitation Framework for Embedded Devices☆13,028Mar 2, 2026Updated 2 weeks ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆14,721Oct 6, 2025Updated 5 months ago
- This is Advance Phishing Tool ! OTP PHISHING☆3,139Jan 5, 2026Updated 2 months ago
- Undetectable Windows Payload Generation☆1,608Nov 8, 2022Updated 3 years ago
- Auto Scanning to SSL Vulnerability☆634Dec 12, 2020Updated 5 years ago
- Dracnmap is an open source program which is using to exploit the network and gathering information with nmap help. Nmap command comes wit…☆1,322Jan 23, 2018Updated 8 years ago
- Payload for teensy like a rubber ducky but the syntax is different. this Human interfaes device ( HID attacks ). Penetration With Teensy …☆1,252Mar 9, 2020Updated 6 years ago
- People tracker on the Internet: OSINT analysis and research tool by Jose Pino☆8,613Jun 20, 2024Updated last year
- Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device.☆3,298Nov 1, 2025Updated 4 months ago
- Accurately Locate Smartphones using Social Engineering☆9,152May 7, 2025Updated 10 months ago
- Image Payload Creating/Injecting tools☆1,291Nov 30, 2023Updated 2 years ago
- DEPRECATED, wifipumpkin3 -> https://github.com/P0cL4bs/wifipumpkin3☆3,158Apr 18, 2020Updated 5 years ago
- Advanced dork Search & Mass Exploit Scanner☆1,558Aug 10, 2024Updated last year
- Full-featured C2 framework which silently persists on webserver with a single-line PHP backdoor☆2,447May 6, 2024Updated last year
- Morpheus - Automating Ettercap TCP/IP (MITM-hijacking Tool)☆876Dec 28, 2018Updated 7 years ago
- NetRipper - Smart traffic sniffing for penetration testers☆1,387Jun 17, 2022Updated 3 years ago
- Generate unicode domains for IDN Homograph Attack and detect them.☆1,250Apr 26, 2022Updated 3 years ago
- The New Hacking Framework☆706Apr 5, 2021Updated 4 years ago
- IP obfuscator made to make a malicious ip a bit cuter☆551Oct 14, 2024Updated last year
- ☆523Aug 11, 2023Updated 2 years ago
- Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) C2 and post-exploitation framework written in python and C☆8,948Mar 22, 2024Updated last year
- Framework for Man-In-The-Middle attacks☆3,636Aug 28, 2018Updated 7 years ago
- Find exploits in local and online databases instantly☆1,811Sep 27, 2021Updated 4 years ago