An adversary may utilize a sim swapping attack for defeating 2fa authentication
☆24Jan 29, 2024Updated 2 years ago
Alternatives and similar repositories for two-factor-authentication-sim-cloning
Users that are interested in two-factor-authentication-sim-cloning are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- An adversary may utilize a sim swapping attack for defeating 2fa authentication☆25Jan 29, 2024Updated 2 years ago
- Interested in intercepting phone calls or text messages? This application converts your phone into a Stingray/ GSM interceptor/IMSI catch…☆20Feb 23, 2021Updated 5 years ago
- Botnet malware designed to infect and control a set of raspberry PIs. For educational purposes only.☆14May 23, 2018Updated 7 years ago
- Threat intelligence or Cyber Threat Intelligence is the process of identifying and analyzing gathered information about past, current, an…☆13Feb 18, 2024Updated 2 years ago
- This script automates the process of unlocking Apple ID accounts by solving captcha challenges, verifying account details, and resetting …☆14Jan 24, 2026Updated 2 months ago
- A collection of awesome lists, manuals, blogs, hacks, one-liners, cli/web tools and more. Especially for System and Network Administrator…☆15Jan 14, 2019Updated 7 years ago
- Kalian Mau Hack Bank Bukan ?☆10Apr 29, 2019Updated 6 years ago
- This ia an Offensive Bruteforce Attack Tool, Just For Educational Purpose Only☆45Jan 14, 2026Updated 2 months ago
- Tool for phishing attacks on the lock screen, Android PIN and iPhone Passcode☆12Mar 7, 2020Updated 6 years ago
- how hackers Hackers can exploit SS7 vulnerabilities to intercept phone calls, SMS messages, and even track the real-time location of a ph…☆32Jan 11, 2025Updated last year
- List of OSINT resources☆17Dec 17, 2020Updated 5 years ago
- Tool to perform brute force attack on TPLink routers☆16Jun 12, 2019Updated 6 years ago
- This is an osint tool which gathers useful and yet credible valid information about a phone number, user's email address and ip address a…☆31Mar 11, 2023Updated 3 years ago
- 27 ways to bypass 2FA/otp☆53Jul 20, 2023Updated 2 years ago
- Brute Force Checkpoint Instagram [CrackerTOOL] v1.0☆20Jul 23, 2017Updated 8 years ago
- WigleAPI-JSON in PHP with JSON Response☆14Nov 18, 2013Updated 12 years ago
- dump network packet and log to database☆10Jul 24, 2022Updated 3 years ago
- Fake (dummy) Payment Gateway for testing purposes.Can payment using cards as well as phone numbers.☆44May 23, 2021Updated 4 years ago
- 🐍 Python Exploit for CVE-2022-23935☆11Feb 10, 2023Updated 3 years ago
- When you need to access a running Windows system, you can use a dictionary attack tool like acccheck to brute-force the admin's username …☆21Jan 6, 2018Updated 8 years ago
- ☆13Dec 21, 2019Updated 6 years ago
- Hacking Tool!! This Tools help you with ethical hacking, Social media hack, phone info, Gmail attack, phone number attack, user discovery…☆17Dec 23, 2024Updated last year
- A WiFi hacking Phishing tool for everyone.☆15Mar 31, 2023Updated 2 years ago
- The NSE Script plugin integrates with Criminal IP CTI search engine for network scanning, showing IP details like WHOIS, running products…☆16Nov 29, 2023Updated 2 years ago
- 《亿级流量网站架构核心技术》 - 笔记☆12Nov 25, 2018Updated 7 years ago
- Video API for Originating Pirated Content☆29May 22, 2023Updated 2 years ago
- A simple utility for moving application data from one virtual space to another.☆23Aug 15, 2019Updated 6 years ago
- A visual developer tool for inspecting your iOS application data structures.☆13Jan 12, 2022Updated 4 years ago
- Gmail Hack Tool☆41Aug 4, 2023Updated 2 years ago
- may the poc with you☆17May 6, 2022Updated 3 years ago
- Use rpc null sessions to retrieve machine list, domain admin list, domain controllers☆13Dec 15, 2022Updated 3 years ago
- Knative common scripts.☆24Updated this week
- a simple keylogger that records hardware inputs like keyboard, mouse, microphone and webcam and sends it to your e-mail.☆14Oct 18, 2024Updated last year
- Creating a pocket-sized network pentesting device, offering standalone power, an LCD touch display, and flexibility to conduct on-the-go …☆48Jan 19, 2025Updated last year
- A web application which acts as an IoT device when loaded in a smart phone browser. The data from the sensors are then used for Anomaly d…☆11Feb 4, 2021Updated 5 years ago
- RemClip is a C# project which permits to steal user clipboard data and send it to a remote web server under attacker control☆15Sep 2, 2024Updated last year
- A Rust port of BuntDB☆15Aug 5, 2021Updated 4 years ago
- Hijack I/O Kit to dispatch touch events to the iOS digitizer☆12Aug 5, 2019Updated 6 years ago
- Cell phone spy app allows you to track every information remotely, monitor every single activity on the phone. It is the best android spy…☆15Feb 1, 2018Updated 8 years ago