This script can be used to gain access to a victim's Samsung Account if they have a specific version of Samsung Members installed on their Samsung Device, and if the victim's device is from the US or Korea region.
☆29Feb 25, 2024Updated 2 years ago
Alternatives and similar repositories for CVE-2021-25374_Samsung-Account-Access
Users that are interested in CVE-2021-25374_Samsung-Account-Access are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This is a node.js application that will allow WiFi configuration of a server. Designed to be used on Gateway devices or devices that need…☆17Jan 7, 2023Updated 3 years ago
- WhatsSpy Public - Spy Tool Whatsapp☆10Aug 23, 2015Updated 10 years ago
- Search Termux Commands and Guide in Termux !!☆12Updated this week
- A localhost implementation of a botnet used to perform a credential stuffing attack☆13Jan 14, 2021Updated 5 years ago
- Elasticsearch to CSV Python Script☆11Jan 28, 2014Updated 12 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- ☆13Apr 8, 2021Updated 5 years ago
- ☆13Jan 6, 2020Updated 6 years ago
- 🛳️ A docker image for building large project on remote&powerful server to save your time. (远程编译Android Project)☆12Jan 5, 2024Updated 2 years ago
- Source code of WeLeakInfo.☆10Jul 31, 2020Updated 5 years ago
- CLI and REPL for Rethinkdb☆22Feb 13, 2021Updated 5 years ago
- Force `go get` to make shallow clone and pulls☆11May 3, 2018Updated 7 years ago
- Various fuzzers written in Python. Currently has a TCP server for fuzzing client software, and a CLI fuzzer to use against programs ran f…☆11Feb 14, 2018Updated 8 years ago
- A Bash wrapper for radamsa that can be used to fuzz exported activities and deep links.☆52Aug 17, 2021Updated 4 years ago
- Chrome extension that lets you view your friend's Instagram Stories in the browser.☆17Aug 11, 2016Updated 9 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A multi-protocol instant messaging client for Windows—mirror of http://svn.miranda-ng.org/main☆11Updated this week
- A pattern based Dalvik deobfuscator which uses limited execution to improve semantic analysis☆13Mar 22, 2022Updated 4 years ago
- Tools for generating and validating IBANs (International Bank Account Numbers)☆10Aug 11, 2020Updated 5 years ago
- A client-server based computer software application that allows the server to share and sync videos with clients in same local network.☆10Mar 20, 2018Updated 8 years ago
- Sample apps taken from Windows Server 2003 and running in Docker Windows containers☆16Aug 24, 2018Updated 7 years ago
- Identifies vulnerabilities in network_security_config.xml, AndroidManifest.xml and if Firebase URL are accessible publicly☆53Mar 15, 2026Updated 3 weeks ago
- The wordlists that have been compiled using disclosed reports at HackerOne bug bounty platform☆10Jun 28, 2020Updated 5 years ago
- A simple and handy tool for a hacker to gain remote access and control another computer☆38Oct 29, 2020Updated 5 years ago
- A flexible cross-platform post-exploitation agent written in Go with basic functionalities☆17Mar 27, 2019Updated 7 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Concurrent HS256 JWT token brute force cracker, inspired by https://github.com/lmammino/jwt-cracker☆13Jan 21, 2022Updated 4 years ago
- Confluence Hardcoded Password POC☆15Jul 30, 2022Updated 3 years ago
- Butterfly Reader for Hacker News, built with Flutter☆16Oct 27, 2019Updated 6 years ago
- ☆25Mar 21, 2020Updated 6 years ago
- VMWare vRealize SSRF-CVE-2021-21975☆14Apr 2, 2021Updated 5 years ago
- ☆10Feb 8, 2021Updated 5 years ago
- This will help you to connect to your phone ( or any phone in general ) remotely using scrcpy☆16Aug 28, 2020Updated 5 years ago
- A "safe way" to do man-in-the-middle attack test, without using ARP attack.☆10Jun 2, 2021Updated 4 years ago
- auto-mine dogecoin at dogeminer.se☆13Feb 20, 2017Updated 9 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Security scanner tool for Plone CMS.☆19May 14, 2012Updated 13 years ago
- Hackers Hunter : Hunt down and track CTF Players & Bug Hunters etc accounts by username across in most places where you can find them☆17Feb 1, 2021Updated 5 years ago
- Fake Mail PHP Script☆13Sep 14, 2017Updated 8 years ago
- Extract both control flow graphs and code parts from APK based on API calls.☆19Mar 22, 2023Updated 3 years ago
- Vulnerability teaching showcase☆13Apr 19, 2016Updated 9 years ago
- API Client Library for is.gd and v.gd targeting .NET Standard 1.1☆13Jun 7, 2023Updated 2 years ago
- GridSound wants to be a free browser-based HTML5 DAW (Digital Audio Workstation) following the new Web Audio API. You can test the applic…☆12Dec 9, 2018Updated 7 years ago