QRLJacking or Quick Response Code Login Jacking is a simple-but-nasty attack vector affecting all the applications that relays on “Login with QR code” feature as a secure way to login into accounts which aims for hijacking users session by attackers.
☆1,536Aug 7, 2025Updated 8 months ago
Alternatives and similar repositories for QRLJacking
Users that are interested in QRLJacking are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks☆1,463Nov 3, 2018Updated 7 years ago
- Phishing Tool & Information Collector☆4,719Oct 29, 2024Updated last year
- Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and et…☆11,193Mar 17, 2024Updated 2 years ago
- Efficient and advanced man in the middle framework☆2,180Mar 23, 2023Updated 3 years ago
- Know the dangers of credential reuse attacks.☆2,103Dec 9, 2025Updated 4 months ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Use a Fake image.jpg to exploit targets (hide known file extensions)☆941May 28, 2025Updated 11 months ago
- CredSniper is a phishing framework written with the Python micro-framework Flask and Jinja2 templating which supports capturing 2FA token…☆1,382May 22, 2020Updated 5 years ago
- Android Remote Administration Tool☆5,144Aug 12, 2021Updated 4 years ago
- Attack Surface Management Platform☆9,715Feb 15, 2026Updated 2 months ago
- EasySploit - Metasploit automation (EASIER and FASTER than EVER)☆381Jan 29, 2020Updated 6 years ago
- AntiVirus Evasion Tool☆1,751Apr 23, 2025Updated last year
- backdoor-apk is a shell script that simplifies the process of adding a backdoor to any Android APK file. Users of this shell script shoul…☆2,347Sep 12, 2022Updated 3 years ago
- Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's po…☆3,910Jan 24, 2024Updated 2 years ago
- ☆1,080Jan 13, 2023Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Hacking systems with the automation of PasteJacking attacks.☆399Oct 14, 2024Updated last year
- Th3Inspector 🕵️ Best Tool For Information Gathering 🔎☆2,623Apr 21, 2025Updated last year
- Exploitation Framework for Embedded Devices☆13,097Mar 2, 2026Updated 2 months ago
- This is Advance Phishing Tool ! OTP PHISHING☆3,182Jan 5, 2026Updated 3 months ago
- Undetectable Windows Payload Generation☆1,608Nov 8, 2022Updated 3 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆15,003Oct 6, 2025Updated 6 months ago
- Auto Scanning to SSL Vulnerability☆635Dec 12, 2020Updated 5 years ago
- Dracnmap is an open source program which is using to exploit the network and gathering information with nmap help. Nmap command comes wit…☆1,334Jan 23, 2018Updated 8 years ago
- Payload for teensy like a rubber ducky but the syntax is different. this Human interfaes device ( HID attacks ). Penetration With Teensy …☆1,255Mar 9, 2020Updated 6 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- People tracker on the Internet: OSINT analysis and research tool by Jose Pino☆8,660Jun 20, 2024Updated last year
- Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device.☆3,323Nov 1, 2025Updated 6 months ago
- Image Payload Creating/Injecting tools☆1,292Nov 30, 2023Updated 2 years ago
- Accurately Locate Smartphones using Social Engineering☆9,308May 7, 2025Updated 11 months ago
- DEPRECATED, wifipumpkin3 -> https://github.com/P0cL4bs/wifipumpkin3☆3,156Apr 18, 2020Updated 6 years ago
- Advanced dork Search & Mass Exploit Scanner☆1,564Aug 10, 2024Updated last year
- Full-featured C2 framework which silently persists on webserver with a single-line PHP backdoor☆2,468May 6, 2024Updated last year
- NetRipper - Smart traffic sniffing for penetration testers☆1,391Jun 17, 2022Updated 3 years ago
- Morpheus - Automating Ettercap TCP/IP (MITM-hijacking Tool)☆877Dec 28, 2018Updated 7 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- The New Hacking Framework☆707Apr 5, 2021Updated 5 years ago
- IP obfuscator made to make a malicious ip a bit cuter☆548Oct 14, 2024Updated last year
- Generate unicode domains for IDN Homograph Attack and detect them.☆1,258Apr 26, 2022Updated 4 years ago
- ☆525Aug 11, 2023Updated 2 years ago
- Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) C2 and post-exploitation framework written in python and C☆8,975Mar 22, 2024Updated 2 years ago
- Framework for Man-In-The-Middle attacks☆3,639Aug 28, 2018Updated 7 years ago
- Find exploits in local and online databases instantly☆1,811Sep 27, 2021Updated 4 years ago