This script can be used to gain access to a victim's Samsung Account if they have a specific version of Samsung Members installed on their Samsung Device, and if the victim's device is from the US or Korea region.
☆30Feb 25, 2024Updated 2 years ago
Alternatives and similar repositories for CVE-2021-25374_Samsung-Account-Access
Users that are interested in CVE-2021-25374_Samsung-Account-Access are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Search Termux Commands and Guide in Termux !!☆12Apr 9, 2026Updated 3 weeks ago
- A localhost implementation of a botnet used to perform a credential stuffing attack☆13Jan 14, 2021Updated 5 years ago
- Elasticsearch to CSV Python Script☆11Jan 28, 2014Updated 12 years ago
- Where's My Browser? Learn hacking WebViews (Android Mobile App)☆45Jul 31, 2018Updated 7 years ago
- ☆13Apr 8, 2021Updated 5 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- ☆13Jan 6, 2020Updated 6 years ago
- Collection of shellcode injection and execution techniques☆16Mar 17, 2026Updated last month
- 🛳️ A docker image for building large project on remote&powerful server to save your time. (远程编译Android Project)☆12Jan 5, 2024Updated 2 years ago
- Start the Windows Subsystem for Android with one click☆13Jan 26, 2023Updated 3 years ago
- Various fuzzers written in Python. Currently has a TCP server for fuzzing client software, and a CLI fuzzer to use against programs ran f…☆11Feb 14, 2018Updated 8 years ago
- A Bash wrapper for radamsa that can be used to fuzz exported activities and deep links.☆52Aug 17, 2021Updated 4 years ago
- simple compiler based on mingw to build uncrackable windows application against analysis tools☆63Dec 22, 2017Updated 8 years ago
- Chrome extension that lets you view your friend's Instagram Stories in the browser.☆17Aug 11, 2016Updated 9 years ago
- White-hat hacking keylogger☆18Apr 9, 2015Updated 11 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- A pattern based Dalvik deobfuscator which uses limited execution to improve semantic analysis☆13Mar 22, 2022Updated 4 years ago
- Tools for generating and validating IBANs (International Bank Account Numbers)☆10Aug 11, 2020Updated 5 years ago
- A client-server based computer software application that allows the server to share and sync videos with clients in same local network.☆10Mar 20, 2018Updated 8 years ago
- Identifies vulnerabilities in network_security_config.xml, AndroidManifest.xml and if Firebase URL are accessible publicly☆53Mar 15, 2026Updated last month
- The wordlists that have been compiled using disclosed reports at HackerOne bug bounty platform☆10Jun 28, 2020Updated 5 years ago
- A flexible cross-platform post-exploitation agent written in Go with basic functionalities☆17Mar 27, 2019Updated 7 years ago
- Concurrent HS256 JWT token brute force cracker, inspired by https://github.com/lmammino/jwt-cracker☆13Jan 21, 2022Updated 4 years ago
- Confluence Hardcoded Password POC☆15Jul 30, 2022Updated 3 years ago
- Checks if an Android application has successfully completed the "App Link Verification" process for Android App Links.☆70Dec 4, 2025Updated 5 months ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- A Hash Collision Attack is an attempt to find two input strings of a hash function that produce the same hash result. Because hash functi…☆15Dec 7, 2017Updated 8 years ago
- Butterfly Reader for Hacker News, built with Flutter☆16Oct 27, 2019Updated 6 years ago
- ☆25Mar 21, 2020Updated 6 years ago
- ☆10Feb 8, 2021Updated 5 years ago
- This will help you to connect to your phone ( or any phone in general ) remotely using scrcpy☆16Aug 28, 2020Updated 5 years ago
- A "safe way" to do man-in-the-middle attack test, without using ARP attack.☆10Jun 2, 2021Updated 4 years ago
- Break rotational letter substitution (ROT) encoded text, right from your terminal.☆14Jan 5, 2023Updated 3 years ago
- Hackers Hunter : Hunt down and track CTF Players & Bug Hunters etc accounts by username across in most places where you can find them☆17Feb 1, 2021Updated 5 years ago
- A simple "ransomware" using powershell☆14May 31, 2021Updated 4 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Extract both control flow graphs and code parts from APK based on API calls.☆19Mar 22, 2023Updated 3 years ago
- GridSound wants to be a free browser-based HTML5 DAW (Digital Audio Workstation) following the new Web Audio API. You can test the applic…☆12Dec 9, 2018Updated 7 years ago
- API Client Library for is.gd and v.gd targeting .NET Standard 1.1☆13Jun 7, 2023Updated 2 years ago
- Anti-forensics tool Inspired by NSA's Marble framework.☆10Apr 17, 2025Updated last year
- ☆14Apr 22, 2014Updated 12 years ago
- a facial detection recognition library based on opencv 3.x☆11Jun 30, 2017Updated 8 years ago
- NSE script to detect ProxyOracle☆13Aug 30, 2021Updated 4 years ago