my own 2fa bypass methodolgy
☆27Sep 22, 2023Updated 2 years ago
Alternatives and similar repositories for 2fa
Users that are interested in 2fa are comparing it to the libraries listed below
Sorting:
- Dons Js Scanner is a sleek command-line tool that hunts for hidden treasures—API keys, credentials, and secrets—lurking in the JavaScript…☆86Jan 7, 2026Updated 2 months ago
- MetaX - Advanced XSS Vulnerability Detector☆15Dec 30, 2025Updated 2 months ago
- Egy-Crack Ethereum PrivateKey (Generator-Cracker)☆32May 10, 2024Updated last year
- Misr: The Ultimate Vulnerability Scanner☆16Aug 9, 2024Updated last year
- Automating SQL Injection in a list of URLs or Request Files☆13Aug 8, 2016Updated 9 years ago
- Malware campaigns and APTs research by BlackArrow☆19Apr 30, 2020Updated 5 years ago
- MacInjector is a tool that lists macOS applications, checks code-signing vulnerabilities, and injects a dynamic library (dylib) into a vu…☆17Oct 8, 2025Updated 5 months ago
- Egyscan The Best web vulnerability scanner; it's a multifaceted security powerhouse designed to fortify your web applications against mal…☆302Dec 30, 2025Updated 2 months ago
- Tool for obtaining information about PPL processes☆16Feb 12, 2024Updated 2 years ago
- ☆17Mar 6, 2023Updated 3 years ago
- ☆13Sep 8, 2024Updated last year
- nistrich allows you to discover CVEs and their severities belong to IP addresses☆13Dec 28, 2022Updated 3 years ago
- Learn how to automate XSS, SSRF, LFI, SQLI, NoSQLi☆44Jul 9, 2021Updated 4 years ago
- AI modular structure that provides automation-based attack and penetration☆14May 10, 2024Updated last year
- bash script for automating subdomain enumeration process either passive or active☆29Feb 24, 2026Updated 3 weeks ago
- This PowerShell script applies a memory patch to bypass the Antimalware Scan Interface (AMSI), allowing unrestricted execution of PowerSh…☆14Jun 2, 2024Updated last year
- Sample Vulnerable and Secure Code Snippets for Various Vulnerabilities☆23Jun 18, 2024Updated last year
- ☆12Aug 25, 2023Updated 2 years ago
- Template Nuclei SSTI☆34Nov 18, 2025Updated 4 months ago
- A small to find Host Header Injection vulnerabilities in a websites☆12Nov 21, 2022Updated 3 years ago
- Persistence techniques for windows.☆19Jun 26, 2023Updated 2 years ago
- This Python script provides functionality to encode PowerShell commands while preserving the environment variables. It's especially usefu…☆16May 6, 2024Updated last year
- A BOF tool that can be used to collect passwords using CredUIPromptForWindowsCredentialsName.☆16Jun 16, 2022Updated 3 years ago
- WP Juicer Tool for quick scanning of confidential information on WordPress endpoints.☆10Apr 30, 2024Updated last year
- Red Team list and cheat sheets☆11Jul 7, 2024Updated last year
- Automate bug bounty recon using bash alias☆15Aug 6, 2024Updated last year
- web based c2 🏴☠️☆15Aug 10, 2024Updated last year
- A simple utility to perform reverse WHOIS lookups using whoisxml API☆45Aug 9, 2023Updated 2 years ago
- A WAF Bypass tool assisting in the use of SQLMap Tampers list according to specific WAF vendors.☆17Mar 3, 2023Updated 3 years ago
- A vulnerable nodejs web app with expresss and MongoDB for final project of cyber security course☆45Dec 9, 2022Updated 3 years ago
- Demo of various ways to exploit post based reflected XSS☆18Jul 6, 2023Updated 2 years ago
- POC Pdf-exploit builder on C#☆13Mar 1, 2024Updated 2 years ago
- BugSquasher Bug Bounty Tools List☆20Feb 2, 2023Updated 3 years ago
- This repository contains links to all the 100 days tweets that I posted during the #100DaysOfHacking challenge.☆17Apr 11, 2022Updated 3 years ago
- AI web vulneraribilty scanner 🤖☆20Feb 22, 2024Updated 2 years ago
- This tool allows you to find ssti vulnerability with ease!☆22Sep 3, 2022Updated 3 years ago
- Methodoloy for pentesting web applications.☆10Aug 18, 2022Updated 3 years ago
- Damn Small SQLi Scanner. (DSSS)☆15Nov 25, 2017Updated 8 years ago
- Challenge Python☆19Apr 26, 2023Updated 2 years ago