QRLJacking or Quick Response Code Login Jacking is a simple-but-nasty attack vector affecting all the applications that relays on “Login with QR code” feature as a secure way to login into accounts which aims for hijacking users session by attackers.
☆1,540Aug 7, 2025Updated 9 months ago
Alternatives and similar repositories for QRLJacking
Users that are interested in QRLJacking are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks☆1,467Nov 3, 2018Updated 7 years ago
- Phishing Tool & Information Collector☆4,729Oct 29, 2024Updated last year
- Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and et…☆11,222Mar 17, 2024Updated 2 years ago
- Efficient and advanced man in the middle framework☆2,184Mar 23, 2023Updated 3 years ago
- Know the dangers of credential reuse attacks.☆2,109Dec 9, 2025Updated 5 months ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Use a Fake image.jpg to exploit targets (hide known file extensions)☆941May 28, 2025Updated 11 months ago
- CredSniper is a phishing framework written with the Python micro-framework Flask and Jinja2 templating which supports capturing 2FA token…☆1,383May 22, 2020Updated 6 years ago
- Android Remote Administration Tool☆5,158Aug 12, 2021Updated 4 years ago
- Attack Surface Management Platform☆10,016Apr 29, 2026Updated 3 weeks ago
- EasySploit - Metasploit automation (EASIER and FASTER than EVER)☆381Jan 29, 2020Updated 6 years ago
- AntiVirus Evasion Tool☆1,752Apr 23, 2025Updated last year
- backdoor-apk is a shell script that simplifies the process of adding a backdoor to any Android APK file. Users of this shell script shoul…☆2,355Sep 12, 2022Updated 3 years ago
- Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's po…☆3,912Jan 24, 2024Updated 2 years ago
- ☆1,086Jan 13, 2023Updated 3 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Hacking systems with the automation of PasteJacking attacks.☆399Oct 14, 2024Updated last year
- Th3Inspector 🕵️ Best Tool For Information Gathering 🔎☆2,626Apr 21, 2025Updated last year
- Exploitation Framework for Embedded Devices☆13,116May 5, 2026Updated 2 weeks ago
- This is Advance Phishing Tool ! OTP PHISHING☆3,199Jan 5, 2026Updated 4 months ago
- Undetectable Windows Payload Generation☆1,608Nov 8, 2022Updated 3 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆15,080Oct 6, 2025Updated 7 months ago
- Auto Scanning to SSL Vulnerability☆634Dec 12, 2020Updated 5 years ago
- Dracnmap is an open source program which is using to exploit the network and gathering information with nmap help. Nmap command comes wit…☆1,337Jan 23, 2018Updated 8 years ago
- Payload for teensy like a rubber ducky but the syntax is different. this Human interfaes device ( HID attacks ). Penetration With Teensy …☆1,258Mar 9, 2020Updated 6 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- People tracker on the Internet: OSINT analysis and research tool by Jose Pino☆8,672Jun 20, 2024Updated last year
- Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device.☆3,337Nov 1, 2025Updated 6 months ago
- Accurately Locate Smartphones using Social Engineering☆9,470May 7, 2025Updated last year
- Image Payload Creating/Injecting tools☆1,294Nov 30, 2023Updated 2 years ago
- DEPRECATED, wifipumpkin3 -> https://github.com/P0cL4bs/wifipumpkin3☆3,154Apr 18, 2020Updated 6 years ago
- Full-featured C2 framework which silently persists on webserver with a single-line PHP backdoor☆2,468May 6, 2024Updated 2 years ago
- Advanced dork Search & Mass Exploit Scanner☆1,569Aug 10, 2024Updated last year
- Morpheus - Automating Ettercap TCP/IP (MITM-hijacking Tool)☆877Dec 28, 2018Updated 7 years ago
- NetRipper - Smart traffic sniffing for penetration testers☆1,391Jun 17, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- The New Hacking Framework☆708Apr 5, 2021Updated 5 years ago
- IP obfuscator made to make a malicious ip a bit cuter☆547Oct 14, 2024Updated last year
- ☆525Aug 11, 2023Updated 2 years ago
- Generate unicode domains for IDN Homograph Attack and detect them.☆1,261Updated this week
- Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) C2 and post-exploitation framework written in python and C☆8,976Mar 22, 2024Updated 2 years ago
- Framework for Man-In-The-Middle attacks☆3,639Aug 28, 2018Updated 7 years ago
- Find exploits in local and online databases instantly☆1,821Sep 27, 2021Updated 4 years ago