Hijack services that relies on QR Code Authentication.
☆275Dec 20, 2023Updated 2 years ago
Alternatives and similar repositories for ohmyqr
Users that are interested in ohmyqr are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ISeeYou is a Bash and Javascript tool to find the exact location of the users during social engineering or phishing engagements. Using ex…☆1,124Apr 5, 2019Updated 7 years ago
- Grab target's webcam shots by link☆1,263Jun 18, 2024Updated last year
- ☆719Sep 10, 2024Updated last year
- Automatically exported from code.google.com/p/ghost-phisher☆391May 4, 2020Updated 5 years ago
- Phishing Tool & Information Collector☆4,711Oct 29, 2024Updated last year
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Ranger Reloaded is a Python script that can be used to scan alive hosts on your network and check for vulnerable open ports.☆30Jan 9, 2023Updated 3 years ago
- rang3r | Multi Thread IP + Port Scanner☆128Oct 28, 2023Updated 2 years ago
- Wordlist creator written in C to generate all possibilities of passwords☆92Jun 16, 2018Updated 7 years ago
- Python wordlist generator☆182Apr 26, 2022Updated 3 years ago
- PLEASE USE NEW VERSION: https://github.com/kgretzky/evilginx2☆1,220Feb 6, 2022Updated 4 years ago
- Fake-AP to perform Evil Twin Attack☆143Jul 29, 2018Updated 7 years ago
- The Social-Engineer Toolkit (SET) repository from TrustedSec - All new versions of SET will be deployed here.☆14,763Oct 21, 2024Updated last year
- Ruby on Rails Phishing Framework☆889Nov 7, 2023Updated 2 years ago
- Tool to check if an app is installed on the target device through a link☆125Mar 13, 2020Updated 6 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Chrome Keylogger Extension | Post Exploitation Tool☆443Apr 26, 2022Updated 3 years ago
- Detect evil urls that uses IDN Homograph Attack.☆208Jan 24, 2018Updated 8 years ago
- This tool allows you to perform OSINT and reconnaissance on an organisation or an individual. It allows one to search 1.4 Billion clear t…☆533Dec 13, 2018Updated 7 years ago
- Script to generate Android App that can hijack autenticated sessions in cookies☆197Dec 21, 2018Updated 7 years ago
- Fast SSH Scan and BruteForcer for most common credentials.☆96Jun 15, 2018Updated 7 years ago
- Inject malicious code into *.debs☆287Apr 26, 2022Updated 3 years ago
- A Simple JS code to keylogger data and send it to the personal server☆31Dec 30, 2024Updated last year
- Web hacking framework with tools, exploits by python☆399Dec 8, 2022Updated 3 years ago
- Auto exploitation tool for CVE-2024-24401.☆36Sep 7, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Simple Remote Access Trojan Tool☆249Feb 18, 2022Updated 4 years ago
- A C# Tool to gather information about email breaches☆16Dec 21, 2023Updated 2 years ago
- Bluetooth Honeypot☆267Apr 2, 2026Updated 2 weeks ago
- Websploit is a high level MITM framework