my own 2fa bypass methodolgy
☆28Sep 22, 2023Updated 2 years ago
Alternatives and similar repositories for 2fa
Users that are interested in 2fa are comparing it to the libraries listed below
Sorting:
- Private XSS BOMB 16k Payloads The Biggest Payloads List online☆19Dec 31, 2023Updated 2 years ago
- Dons Js Scanner is a sleek command-line tool that hunts for hidden treasures—API keys, credentials, and secrets—lurking in the JavaScript…☆87Jan 7, 2026Updated last month
- Bug Bounty Roadmap☆37Sep 15, 2023Updated 2 years ago
- Malware campaigns and APTs research by BlackArrow☆19Apr 30, 2020Updated 5 years ago
- ☆12Aug 25, 2023Updated 2 years ago
- WP Juicer Tool for quick scanning of confidential information on WordPress endpoints.☆10Apr 30, 2024Updated last year
- This PowerShell script applies a memory patch to bypass the Antimalware Scan Interface (AMSI), allowing unrestricted execution of PowerSh…☆14Jun 2, 2024Updated last year
- ☆13Sep 8, 2024Updated last year
- Tool for obtaining information about PPL processes☆16Feb 12, 2024Updated 2 years ago
- Trojan written in C++ for Windows☆20Mar 12, 2024Updated last year
- A small to find Host Header Injection vulnerabilities in a websites☆11Nov 21, 2022Updated 3 years ago
- Methodoloy for pentesting web applications.☆10Aug 18, 2022Updated 3 years ago
- AI modular structure that provides automation-based attack and penetration☆14May 10, 2024Updated last year
- bash script for automating subdomain enumeration process either passive or active☆29Updated this week
- web based c2 🏴☠️☆15Aug 10, 2024Updated last year
- MetaX - Advanced XSS Vulnerability Detector☆15Dec 30, 2025Updated 2 months ago
- Red Team list and cheat sheets☆11Jul 7, 2024Updated last year
- POC Pdf-exploit builder on C#☆13Mar 1, 2024Updated 2 years ago
- MacInjector is a tool that lists macOS applications, checks code-signing vulnerabilities, and injects a dynamic library (dylib) into a vu…☆17Oct 8, 2025Updated 4 months ago
- Compilation of commands for hacking tasks and security tools as a bit of everything☆14Jul 3, 2025Updated 7 months ago
- nistrich allows you to discover CVEs and their severities belong to IP addresses☆13Dec 28, 2022Updated 3 years ago
- This repository contains links to all the 100 days tweets that I posted during the #100DaysOfHacking challenge.☆17Apr 11, 2022Updated 3 years ago
- A collection of payloads for different vulnerabilities, best payload lists in one repository☆17Jul 28, 2021Updated 4 years ago
- ☆17Mar 6, 2023Updated 2 years ago
- Template Nuclei SSTI☆34Nov 18, 2025Updated 3 months ago
- A WAF Bypass tool assisting in the use of SQLMap Tampers list according to specific WAF vendors.☆17Mar 3, 2023Updated 2 years ago
- Demo of various ways to exploit post based reflected XSS☆18Jul 6, 2023Updated 2 years ago
- Damn Small SQLi Scanner. (DSSS)☆15Nov 25, 2017Updated 8 years ago
- This Python script provides functionality to encode PowerShell commands while preserving the environment variables. It's especially usefu…☆16May 6, 2024Updated last year
- AI web vulneraribilty scanner 🤖☆21Feb 22, 2024Updated 2 years ago
- Persistence techniques for windows.☆19Jun 26, 2023Updated 2 years ago
- AzureAD Pentest☆25Mar 24, 2022Updated 3 years ago
- Automatic Mass Tool for check and exploiting vulnerability in CVE-2023-3076 - MStore API < 3.9.9 - Unauthenticated Privilege Escalation (…☆16Sep 20, 2023Updated 2 years ago
- A simple utility to perform reverse WHOIS lookups using whoisxml API☆45Aug 9, 2023Updated 2 years ago
- Automate bug bounty recon using bash alias☆15Aug 6, 2024Updated last year
- BugSquasher Bug Bounty Tools List☆20Feb 2, 2023Updated 3 years ago
- A PoC C2 tool utilizing Google Calendar events as a covert channel for communication between attacker and target.☆19Jun 22, 2023Updated 2 years ago
- A ddos tool for penetration of websites☆15Dec 13, 2020Updated 5 years ago
- 27 ways to bypass 2FA/otp☆52Jul 20, 2023Updated 2 years ago