Hijack services that relies on QR Code Authentication.
☆271Dec 20, 2023Updated 2 years ago
Alternatives and similar repositories for ohmyqr
Users that are interested in ohmyqr are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ISeeYou is a Bash and Javascript tool to find the exact location of the users during social engineering or phishing engagements. Using ex…☆1,113Apr 5, 2019Updated 6 years ago
- Grab target's webcam shots by link☆1,255Jun 18, 2024Updated last year
- ☆710Sep 10, 2024Updated last year
- Automatically exported from code.google.com/p/ghost-phisher☆388May 4, 2020Updated 5 years ago
- Phishing Tool & Information Collector☆4,692Oct 29, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Ranger Reloaded is a Python script that can be used to scan alive hosts on your network and check for vulnerable open ports.☆30Jan 9, 2023Updated 3 years ago
- rang3r | Multi Thread IP + Port Scanner☆128Oct 28, 2023Updated 2 years ago
- Wordlist creator written in C to generate all possibilities of passwords☆90Jun 16, 2018Updated 7 years ago
- Python wordlist generator☆181Apr 26, 2022Updated 3 years ago
- PLEASE USE NEW VERSION: https://github.com/kgretzky/evilginx2☆1,215Feb 6, 2022Updated 4 years ago
- Fake-AP to perform Evil Twin Attack☆144Jul 29, 2018Updated 7 years ago
- The Social-Engineer Toolkit (SET) repository from TrustedSec - All new versions of SET will be deployed here.☆14,683Oct 21, 2024Updated last year
- Tool to check if an app is installed on the target device through a link☆125Mar 13, 2020Updated 6 years ago
- Ruby on Rails Phishing Framework☆885Nov 7, 2023Updated 2 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Detect evil urls that uses IDN Homograph Attack.☆206Jan 24, 2018Updated 8 years ago
- Chrome Keylogger Extension | Post Exploitation Tool☆440Apr 26, 2022Updated 3 years ago
- This tool allows you to perform OSINT and reconnaissance on an organisation or an individual. It allows one to search 1.4 Billion clear t…☆530Dec 13, 2018Updated 7 years ago
- Script to generate Android App that can hijack autenticated sessions in cookies☆195Dec 21, 2018Updated 7 years ago
- Fast SSH Scan and BruteForcer for most common credentials.☆96Jun 15, 2018Updated 7 years ago
- Inject malicious code into *.debs☆285Apr 26, 2022Updated 3 years ago
- A Simple JS code to keylogger data and send it to the personal server☆31Dec 30, 2024Updated last year
- Web hacking framework with tools, exploits by python☆395Dec 8, 2022Updated 3 years ago
- Auto exploitation tool for CVE-2024-24401.☆36Sep 7, 2024Updated last year
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Simple Remote Access Trojan Tool☆244Feb 18, 2022Updated 4 years ago
- A C# Tool to gather information about email breaches☆16Dec 21, 2023Updated 2 years ago
- Bluetooth Honeypot☆268Jan 2, 2021Updated 5 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆14,756Oct 6, 2025Updated 5 months ago
- Websploit is a high level MITM framework☆146Apr 22, 2022Updated 3 years ago
- Script that generates an Android App to hack SMS through WAN☆397Jan 15, 2025Updated last year
- Script to generate a Win32 payload that can take images from the WebCam and send it to the attacker☆100Dec 18, 2018Updated 7 years ago
- CVE-2024-32640 | Automated SQLi Exploitation PoC☆78May 16, 2024Updated last year
- IP tracker developed with Python using public APIs☆182May 3, 2017Updated 8 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Widget Options – The #1 WordPress Widget & Block Control Plugin <= 4.0.7 - Authenticated (Contributor+) Remote Code Execution☆13Dec 2, 2024Updated last year
- WiFi Cracking Tool (Using Evil Twin Attack) With Some Modification. (Only For Legal Purposes)☆281May 13, 2018Updated 7 years ago
- Phishing Campaign Toolkit☆2,529Jul 29, 2025Updated 7 months ago
- Android Keylogger + Reverse Shell☆462Apr 1, 2022Updated 3 years ago
- ☆253Nov 17, 2023Updated 2 years ago
- Instagram bruteforce exploit module☆817Mar 29, 2024Updated last year
- A simple XSS finding tool☆111Nov 9, 2018Updated 7 years ago