ReversecLabs / CVE-2021-25374_Samsung-Account-AccessLinks
This script can be used to gain access to a victim's Samsung Account if they have a specific version of Samsung Members installed on their Samsung Device, and if the victim's device is from the US or Korea region.
☆26Updated last year
Alternatives and similar repositories for CVE-2021-25374_Samsung-Account-Access
Users that are interested in CVE-2021-25374_Samsung-Account-Access are comparing it to the libraries listed below
Sorting:
- Android Crypter/Decrypter App Generator☆50Updated 7 years ago
- Arcane is a simple script designed to backdoor iOS packages (iphone-arm) and create the necessary resources for APT repositories.☆155Updated 5 years ago
- Arkhota, a web brute forcer for Android.☆19Updated 2 years ago
- An Android spyware which interacts with a remote C&C server to exfiltrate phone data☆76Updated 5 years ago
- ☆53Updated 4 years ago
- Wi-Fi Exploit Tool☆52Updated 5 years ago
- ☆46Updated 5 years ago
- Bramble is a hacking Open source suite.☆84Updated 5 years ago
- Simple script to download some missing tools in Kali☆33Updated 5 years ago
- ☆17Updated 6 years ago
- Pentesting Mobile apps and resources www.sniferl4bs.com☆39Updated 4 years ago
- androrat☆23Updated 6 years ago
- Advanced Spear Phishing tool for Facebook with 2 factor authentication bypass! May contain minor bugs due to...idk☆54Updated 4 years ago
- Python Script to Crack Zip Password with Dictionary attack and also use Crunch as Pipeline☆38Updated 7 years ago
- Super Simple Python Word List Generator for Fuzzing and Brute Forcing in Python☆55Updated 5 years ago
- Your eyes on the target - SPY☆25Updated 5 years ago
- Bash script that automates the enumeration of domain, subdomains & web servers in the active information gathering.☆58Updated 2 years ago
- Kali Nethunter for OnePlus 3T & MI9T☆48Updated 3 years ago
- Simple Backdoor Manager with Python (based on weevely)☆96Updated 10 months ago
- Exploit Pack - Project☆72Updated 6 years ago
- Just Mod Version of lokiboard with remote reporting via Gmail☆46Updated 5 years ago
- All Zero Day Exploits☆21Updated 8 years ago
- Usage of WH-HackerExploit Hacking - v2 Tool for attacking targets without prior mutual consent is illegal. It's the end user's responsib…☆64Updated 5 years ago
- A multi threaded Python script designed to brute force directories and files names on webservers.☆79Updated 3 years ago
- XposedOrNot (XoN) tool is to search an aggregated repository of xposed passwords comprising of ~850 million real time passwords. Usage of…☆147Updated 6 years ago
- WebHook for Red Team☆25Updated 4 years ago
- Double-Free BUG in WhatsApp exploit poc.☆98Updated 5 years ago
- Enumerate a target Based off of Nmap Results☆76Updated 2 years ago
- A tiny keylogger coded with just 12 lines of Python script, which hooks to the kernel, intercepts keystrokes and forwards them to your we…☆35Updated last month
- Google hacking, also named Google dorking, is a hacker technique that uses Google Search and other Google applications to find security h…☆14Updated 4 years ago