QRLJacking or Quick Response Code Login Jacking is a simple-but-nasty attack vector affecting all the applications that relays on “Login with QR code” feature as a secure way to login into accounts which aims for hijacking users session by attackers.
☆1,531Aug 7, 2025Updated 8 months ago
Alternatives and similar repositories for QRLJacking
Users that are interested in QRLJacking are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks☆1,457Nov 3, 2018Updated 7 years ago
- Phishing Tool & Information Collector☆4,709Oct 29, 2024Updated last year
- Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and et…☆11,116Mar 17, 2024Updated 2 years ago
- Efficient and advanced man in the middle framework☆2,180Mar 23, 2023Updated 3 years ago
- Know the dangers of credential reuse attacks.☆2,103Dec 9, 2025Updated 4 months ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Use a Fake image.jpg to exploit targets (hide known file extensions)☆938May 28, 2025Updated 10 months ago
- CredSniper is a phishing framework written with the Python micro-framework Flask and Jinja2 templating which supports capturing 2FA token…☆1,384May 22, 2020Updated 5 years ago
- Android Remote Administration Tool☆5,126Aug 12, 2021Updated 4 years ago
- Attack Surface Management Platform☆9,650Feb 15, 2026Updated last month
- EasySploit - Metasploit automation (EASIER and FASTER than EVER)☆381Jan 29, 2020Updated 6 years ago
- AntiVirus Evasion Tool☆1,750Apr 23, 2025Updated 11 months ago
- backdoor-apk is a shell script that simplifies the process of adding a backdoor to any Android APK file. Users of this shell script shoul…☆2,346Sep 12, 2022Updated 3 years ago
- ☆1,080Jan 13, 2023Updated 3 years ago
- Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's po…☆3,907Jan 24, 2024Updated 2 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Hacking systems with the automation of PasteJacking attacks.☆399Oct 14, 2024Updated last year
- Th3Inspector 🕵️ Best Tool For Information Gathering 🔎☆2,602Apr 21, 2025Updated 11 months ago
- Exploitation Framework for Embedded Devices☆13,066Mar 2, 2026Updated last month
- This is Advance Phishing Tool ! OTP PHISHING☆3,165Jan 5, 2026Updated 3 months ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆14,816Oct 6, 2025Updated 6 months ago
- Undetectable Windows Payload Generation☆1,610Nov 8, 2022Updated 3 years ago
- Auto Scanning to SSL Vulnerability☆634Dec 12, 2020Updated 5 years ago
- Dracnmap is an open source program which is using to exploit the network and gathering information with nmap help. Nmap command comes wit…☆1,324Jan 23, 2018Updated 8 years ago
- Payload for teensy like a rubber ducky but the syntax is different. this Human interfaes device ( HID attacks ). Penetration With Teensy …☆1,255Mar 9, 2020Updated 6 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- People tracker on the Internet: OSINT analysis and research tool by Jose Pino☆8,636Jun 20, 2024Updated last year
- Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device.☆3,311Nov 1, 2025Updated 5 months ago
- Image Payload Creating/Injecting tools☆1,292Nov 30, 2023Updated 2 years ago
- Accurately Locate Smartphones using Social Engineering☆9,218May 7, 2025Updated 11 months ago
- DEPRECATED, wifipumpkin3 -> https://github.com/P0cL4bs/wifipumpkin3☆3,156Apr 18, 2020Updated 5 years ago
- Full-featured C2 framework which silently persists on webserver with a single-line PHP backdoor☆2,453May 6, 2024Updated last year
- Advanced dork Search & Mass Exploit Scanner☆1,559Aug 10, 2024Updated last year
- NetRipper - Smart traffic sniffing for penetration testers☆1,390Jun 17, 2022Updated 3 years ago
- Morpheus - Automating Ettercap TCP/IP (MITM-hijacking Tool)☆876Dec 28, 2018Updated 7 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- The New Hacking Framework☆707Apr 5, 2021Updated 5 years ago
- Generate unicode domains for IDN Homograph Attack and detect them.☆1,256Apr 26, 2022Updated 3 years ago
- IP obfuscator made to make a malicious ip a bit cuter☆551Oct 14, 2024Updated last year
- ☆526Aug 11, 2023Updated 2 years ago
- Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) C2 and post-exploitation framework written in python and C☆8,960Mar 22, 2024Updated 2 years ago
- Framework for Man-In-The-Middle attacks☆3,634Aug 28, 2018Updated 7 years ago
- Find exploits in local and online databases instantly☆1,808Sep 27, 2021Updated 4 years ago