An adversary may utilize a sim swapping attack for defeating 2fa authentication
☆24Jan 29, 2024Updated 2 years ago
Alternatives and similar repositories for two-factor-authentication-sim-cloning
Users that are interested in two-factor-authentication-sim-cloning are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- An adversary may utilize a sim swapping attack for defeating 2fa authentication☆26Jan 29, 2024Updated 2 years ago
- Interested in intercepting phone calls or text messages? This application converts your phone into a Stingray/ GSM interceptor/IMSI catch…☆21Feb 23, 2021Updated 5 years ago
- Botnet malware designed to infect and control a set of raspberry PIs. For educational purposes only.☆14May 23, 2018Updated 7 years ago
- This script automates the process of unlocking Apple ID accounts by solving captcha challenges, verifying account details, and resetting …☆14Jan 24, 2026Updated 2 months ago
- A collection of awesome lists, manuals, blogs, hacks, one-liners, cli/web tools and more. Especially for System and Network Administrator…☆15Jan 14, 2019Updated 7 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Kalian Mau Hack Bank Bukan ?☆10Apr 29, 2019Updated 6 years ago
- Tool for phishing attacks on the lock screen, Android PIN and iPhone Passcode☆12Mar 7, 2020Updated 6 years ago
- Simple Tool For Brute Force The Truecrypt Files☆10Mar 29, 2014Updated 12 years ago
- BigQuery based rainbow tables☆13Dec 2, 2018Updated 7 years ago
- Find someone's email address using Python and Rapportive☆21Jan 3, 2014Updated 12 years ago
- List of OSINT resources☆16Dec 17, 2020Updated 5 years ago
- how hackers Hackers can exploit SS7 vulnerabilities to intercept phone calls, SMS messages, and even track the real-time location of a ph…☆33Jan 11, 2025Updated last year
- Live demonstration buttons for https://developers.google.com/pay/api/web/guides/resources/demos☆11Mar 16, 2026Updated 3 weeks ago
- Tool to perform brute force attack on TPLink routers☆16Jun 12, 2019Updated 6 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- This is an osint tool which gathers useful and yet credible valid information about a phone number, user's email address and ip address a…☆32Mar 11, 2023Updated 3 years ago
- NOGO is a packaging script that creates fully undetectable payloads specializing in disabling anti-virus. Created for pentesting (crippli…☆11Apr 23, 2019Updated 6 years ago
- A python script file to crack encrypted .zip files using a dictionary attack, a hash attack, or a alphanumeric brute force attack.☆11Nov 2, 2024Updated last year
- Autoconnect MSR-100 Magnetic Stripe Card Reader and returns CardInfo on Swipe event.☆13Sep 26, 2022Updated 3 years ago
- 27 ways to bypass 2FA/otp☆53Jul 20, 2023Updated 2 years ago
- 🐍 Python Exploit for CVE-2022-23935☆11Feb 10, 2023Updated 3 years ago
- Facebook Accounts Hacking Tool (By Brute Force Attack)☆10Jun 6, 2018Updated 7 years ago
- Clone from the Osmocom sim-tools.git with added features☆17Jan 22, 2021Updated 5 years ago
- ☆13Dec 21, 2019Updated 6 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Digispark 6-Digit PIN Brute Force attack for USB-OTG Android devices☆23Nov 19, 2024Updated last year
- A WiFi hacking Phishing tool for everyone.☆15Mar 31, 2023Updated 3 years ago
- The NSE Script plugin integrates with Criminal IP CTI search engine for network scanning, showing IP details like WHOIS, running products…☆16Nov 29, 2023Updated 2 years ago
- 《亿级 流量网站架构核心技术》 - 笔记☆12Nov 25, 2018Updated 7 years ago
- iCloud account reactivate☆16Jan 30, 2017Updated 9 years ago
- A simple utility for moving application data from one virtual space to another.☆23Aug 15, 2019Updated 6 years ago
- A visual developer tool for inspecting your iOS application data structures.☆13Jan 12, 2022Updated 4 years ago
- SkeletonKey is capable of advanced encryption, decryption, and breaking ciphers through various methods. These methods include but are no…☆46Sep 26, 2023Updated 2 years ago
- Gmail Hack Tool☆40Aug 4, 2023Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- may the poc with you☆17May 6, 2022Updated 3 years ago
- A super fast multithreaded ports scanner that scans for open listening ports on the target server with multiple methods and user-specifie…☆23May 28, 2021Updated 4 years ago
- Use rpc null sessions to retrieve machine list, domain admin list, domain controllers☆13Dec 15, 2022Updated 3 years ago
- Creating a pocket-sized network pentesting device, offering standalone power, an LCD touch display, and flexibility to conduct on-the-go …☆50Jan 19, 2025Updated last year
- a simple keylogger that records hardware inputs like keyboard, mouse, microphone and webcam and sends it to your e-mail.☆18Oct 18, 2024Updated last year
- A fast dictionary attack tool (700,000+ candidates per second), that attacks a supported hash with a user-defined dictionary file's candi…☆22May 3, 2021Updated 4 years ago
- A web application which acts as an IoT device when loaded in a smart phone browser. The data from the sensors are then used for Anomaly d…☆11Feb 4, 2021Updated 5 years ago