An adversary may utilize a sim swapping attack for defeating 2fa authentication
☆23Jan 29, 2024Updated 2 years ago
Alternatives and similar repositories for two-factor-authentication-sim-cloning
Users that are interested in two-factor-authentication-sim-cloning are comparing it to the libraries listed below
Sorting:
- An adversary may utilize a sim swapping attack for defeating 2fa authentication☆25Jan 29, 2024Updated 2 years ago
- Tool for phishing attacks on the lock screen, Android PIN and iPhone Passcode☆12Mar 7, 2020Updated 5 years ago
- Botnet malware designed to infect and control a set of raspberry PIs. For educational purposes only.☆14May 23, 2018Updated 7 years ago
- Interested in intercepting phone calls or text messages? This application converts your phone into a Stingray/ GSM interceptor/IMSI catch…☆20Feb 23, 2021Updated 5 years ago
- This script automates the process of unlocking Apple ID accounts by solving captcha challenges, verifying account details, and resetting …☆14Jan 24, 2026Updated last month
- iCloud account reactivate☆16Jan 30, 2017Updated 9 years ago
- This ia an Offensive Bruteforce Attack Tool, Just For Educational Purpose Only☆44Jan 14, 2026Updated last month
- how hackers Hackers can exploit SS7 vulnerabilities to intercept phone calls, SMS messages, and even track the real-time location of a ph…☆30Jan 11, 2025Updated last year
- File Clonnig☆12Apr 18, 2024Updated last year
- Satanic Crypter A powerful tool designed to convert EXE files into BAT files with advanced features and a modern GUI interface.☆11Jan 4, 2025Updated last year
- Gmail Hack Tool☆37Aug 4, 2023Updated 2 years ago
- Creating a pocket-sized network pentesting device, offering standalone power, an LCD touch display, and flexibility to conduct on-the-go …☆44Jan 19, 2025Updated last year
- This is an osint tool which gathers useful and yet credible valid information about a phone number, user's email address and ip address a…☆31Mar 11, 2023Updated 2 years ago
- Trace any mobile number details on map and get owner name, address & location.☆42Mar 26, 2023Updated 2 years ago
- Tools Hack Fb terbaru 2020 by MBEWLEGS☆10Dec 28, 2021Updated 4 years ago
- Material For Malware Analysis Fundamentals Workshop By Eslam Abbas "Mr Robot"☆23Oct 9, 2025Updated 4 months ago
- Javascript keylogger in a chrome extension that sends keystrokes to discord☆10Jan 5, 2024Updated 2 years ago
- Fast command crack fb☆12Apr 22, 2022Updated 3 years ago
- This is a repository focused on SS7 protocol research focusing on vulnerabilities, security flaws, attack methodologies, techniques, and …☆48Sep 22, 2024Updated last year
- Fake (dummy) Payment Gateway for testing purposes.Can payment using cards as well as phone numbers.☆44May 23, 2021Updated 4 years ago
- real time face swap and one-click video deepfake with only a single image☆14Sep 10, 2024Updated last year
- Mission: Create a mobile application that can keep track of a user. When the user logs into to the system, the user's image will be captu…☆14Sep 26, 2018Updated 7 years ago
- Hacking Tool!! This Tools help you with ethical hacking, Social media hack, phone info, Gmail attack, phone number attack, user discovery…☆16Dec 23, 2024Updated last year
- Protection from saycheese.☆10Aug 25, 2021Updated 4 years ago
- ☆10Aug 13, 2022Updated 3 years ago
- G-Surge☆11Feb 7, 2018Updated 8 years ago
- https://www.facebook.com/hackaphone Information for hackers: Download the app: http://mod-color.com/download/preregister.apk Allow inst…☆12Sep 11, 2016Updated 9 years ago
- ☆10Aug 21, 2023Updated 2 years ago
- ☆10Apr 2, 2022Updated 3 years ago
- My Blog - https://0xresetti.github.io☆11Updated this week
- ☆10Jun 24, 2022Updated 3 years ago
- A visual developer tool for inspecting your iOS application data structures.☆13Jan 12, 2022Updated 4 years ago
- ☆10Jan 3, 2022Updated 4 years ago
- ☆11Dec 28, 2023Updated 2 years ago
- INTERNATIONAL 30 COUNTRY CRACKER 6,7,AND CRACKING FROM OWN PASSWORD HAS BEEN ADDED ENJOY GUYS🥰☆11Feb 1, 2022Updated 4 years ago
- 🏍Fast Home Delivery App of Grocery ,Medicines , Vegetables ,etc during lockdown . Client can send Handwritten List Photo ,Chat with Shop…☆11Jun 27, 2020Updated 5 years ago
- Tools that i have gatherd and study to see how thay work and learned why theses tools execute there attacks. I started to have the intres…☆10Dec 25, 2020Updated 5 years ago
- An autonomous service implementing a decentralized Impact Evaluator☆13Dec 1, 2025Updated 3 months ago
- You can now get rid of all metasploit problems on all different Android versions through this script☆17May 8, 2023Updated 2 years ago