Automated Social Media Phishing Tool. Automated tool that allow us to hack accounts with 2FA Bypass.
β43Mar 10, 2024Updated 2 years ago
Alternatives and similar repositories for white-spikes
Users that are interested in white-spikes are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- An MITM based Social Engineering (Phishing)attack POC!β10Mar 25, 2014Updated 12 years ago
- INSTAGRAM MASS REPORTER TOOL SUPER FAST BAN ACCOUNT πβ29Apr 17, 2025Updated 11 months ago
- β14Aug 30, 2024Updated last year
- This project is a modification of Openra1n to fully boot jailbreak on iOS 15 - 16.5.1 . with the help of Palera1n's code, this project noβ¦β12Jul 27, 2023Updated 2 years ago
- A tool designed to analyse email headersβ40Oct 4, 2022Updated 3 years ago
- Managed Kubernetes at scale on DigitalOcean β’ AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Instantly search the web for hacked data. Check if you appear in any database leaks.β15Nov 22, 2018Updated 7 years ago
- πΎ A command-line tool to easily run a man-in-the-middle attack leveraging ARP cache poisoning.β13Sep 15, 2024Updated last year
- A quick command line utility that generates uses simple addition to obfuscate individual characters, then executes itβ16Jun 13, 2025Updated 9 months ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of β¦β18Apr 4, 2023Updated 2 years ago
- β14Sep 12, 2020Updated 5 years ago
- Instructions for turning off the keyless opening feature of your car so it can't be stolen using a relay attackβ20Aug 23, 2025Updated 7 months ago
- Nitko web server scannerβ15Sep 25, 2019Updated 6 years ago
- Read text messages in the android phone inbox.β13Jun 27, 2021Updated 4 years ago
- PoC code for stealing the WiFi password of a network with a Lovebox IOT device connectedβ13May 12, 2022Updated 3 years ago
- End-to-end encrypted email - Proton Mail β’ AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- FB-HACKERβ13Apr 2, 2023Updated 2 years ago
- Script to download, build, and install the most recent libplist, libusbmuxd, libimobiledevice, libirecovery, idevicerestore, usbmuxd, libβ¦β11Feb 16, 2026Updated last month
- Angry Oxide running on Raspberry Pi Zero 2 with waveshare 2.13β e paper HATβ11May 28, 2024Updated last year
- Advanced MITM Toolβ13Jul 27, 2025Updated 8 months ago
- Documentation for Snusbase and the Snusbase API.β24Feb 8, 2026Updated last month
- Facebook phisher to get password and email of victim.β29Mar 13, 2018Updated 8 years ago
- β13Nov 6, 2024Updated last year
- π **Phone Number Details Extractor Code** Uncover phone number mysteries effortlessly! This Python code, powered by phonenumbers, reveaβ¦β16Mar 2, 2024Updated 2 years ago
- Generate random test credit card numbers for testing, validation and/or verification purposes.β12Nov 28, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling on Cloudways β’ AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Instagram Proxy Server which used to support bypass instagram authenticate api.β25Jun 27, 2022Updated 3 years ago
- β15Feb 19, 2025Updated last year
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writteβ¦β28Apr 25, 2022Updated 3 years ago
- Android devices using ADB via the Shodan API. It prompts the user for a command payload, then establishes TCP connections to devices withβ¦β14Jan 7, 2026Updated 2 months ago
- OANDA powered forex trading botβ11Mar 18, 2018Updated 8 years ago
- Touchscreen control library for the T-Display S3 Touchβ12Dec 19, 2024Updated last year
- yet another distribution for jailbreaking A7-A11 iOS devices with checkra1nβ16Sep 3, 2024Updated last year
- Real-time Android app for streaming camera, microphone, live notifications, call logs, sms messages and gps location to a web browser usiβ¦β28Jan 25, 2026Updated 2 months ago
- Facebook Hacking Brute Force Tool for termux or Terminalβ12Aug 17, 2020Updated 5 years ago
- Virtual machines for every use case on DigitalOcean β’ AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Bypass iCloudβ13Dec 9, 2023Updated 2 years ago
- Cash App Money Code Generator 2022 : Real Cash App Money Generator Cash App Money β Free Cash App Money Generator No Verification No Suβ¦β13Jun 27, 2022Updated 3 years ago
- Captive Portal. A Hotspot or Evil twin which redirects the clients to login page to enter credentials. Simple and easy to use with less bβ¦β27Jul 28, 2018Updated 7 years ago
- All your layer are belong to usβ21Jan 29, 2014Updated 12 years ago
- 27 ways to bypass 2FA/otpβ53Jul 20, 2023Updated 2 years ago
- A tool to extract local data storage of an Android application in one click.β20Dec 8, 2018Updated 7 years ago
- A web3 authentication service on IPFS gatewayβ20Oct 12, 2024Updated last year