martinvigo / voicemailautomatorLinks
A tool that serves as a Proof of Concept for the research I presented at DEF CON 26, "Compromising online accounts by cracking voicemail systems"
☆160Updated last year
Alternatives and similar repositories for voicemailautomator
Users that are interested in voicemailautomator are comparing it to the libraries listed below
Sorting:
- Ransombile is a tool that can be used in different scenarios to compromise someone’s digital life when having physical access to a locked…☆81Updated 3 years ago
- A tool to harvest credentials from leaked data dump☆73Updated 3 years ago
- An automated Wireless RogueAP MITM attack framework.☆186Updated 6 years ago
- This tool allows you mass play any YouTube video, terminate apps and rename Chromecast device(s) obtained from Shodan.io☆163Updated 2 years ago
- Retrieve someones private Facebook location, using their public information.☆56Updated 4 years ago
- Python util to retrieve full display name and profile picture from a single email address☆102Updated 3 years ago
- Bluetooth Honeypot☆260Updated 4 years ago
- Arduino Rubber Ducky Framework☆107Updated 6 years ago
- Parser for data dumps Collection #1 / Collection #2-5☆147Updated 6 years ago
- OSINT tool for testing privacy and social engineering vulnerability of organizations.☆93Updated 6 years ago
- Multiplatform payload dropper☆275Updated 3 years ago
- A list of private and public (more or less) blackhat boards☆269Updated 6 years ago
- Intelligence and Reconnaissance Package/Bundle installer.☆241Updated 4 years ago
- Your Social Engineering Sidekick☆183Updated 2 years ago
- Python script that gets Twitter users' tweets location☆109Updated 7 years ago
- Useful for digital forensics investigations or initial black-box pentest footprinting.☆142Updated 4 years ago
- A simple wordlists generator and mangler written in Python 3.10.1.☆121Updated last year
- A Web Application to Send and Track Spear Phishing Campaigns☆101Updated 7 years ago
- Password wordlist generator using song lyrics for targeted bruteforce audits / attacks. Useful for penetration testing or security resear…☆98Updated last year
- Live-scraping pastebin to fight boredom.☆112Updated 3 years ago
- Use hashcat to crack WPA2 PSK (Pre-Shared Key) passwords!☆76Updated 6 years ago
- A document metadata spider.☆72Updated 8 years ago
- ☆150Updated 2 years ago
- Command-line Google dork tool. This is an early predecessor to dorkbot, which may be more useful: https://github.com/utiso/dorkbot☆147Updated 8 years ago
- LeakScraper is an efficient set of tools to process and visualize huge text files containing credentials. Theses tools are designed to he…☆425Updated 6 years ago
- Darknet OSINT Transform☆122Updated 6 years ago
- SMS Phishing Tools☆79Updated 8 years ago
- SS7 Assessment Tool☆250Updated 2 years ago
- PortForce - A custom port Brute Forcing Tool for CTF's & Pentests☆33Updated 8 years ago
- The fastest tool for analyzing and dumping WhatsApp accounts (in ~15s).☆96Updated 2 years ago