An adversary may utilize a sim swapping attack for defeating 2fa authentication
☆25Jan 29, 2024Updated 2 years ago
Alternatives and similar repositories for two-factor-authentication-sim-cloning
Users that are interested in two-factor-authentication-sim-cloning are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Interested in intercepting phone calls or text messages? This application converts your phone into a Stingray/ GSM interceptor/IMSI catch…☆21Feb 23, 2021Updated 5 years ago
- Botnet malware designed to infect and control a set of raspberry PIs. For educational purposes only.☆14May 23, 2018Updated 7 years ago
- This script automates the process of unlocking Apple ID accounts by solving captcha challenges, verifying account details, and resetting …☆14Jan 24, 2026Updated 3 months ago
- A collection of awesome lists, manuals, blogs, hacks, one-liners, cli/web tools and more. Especially for System and Network Administrator…☆15Jan 14, 2019Updated 7 years ago
- Tool for phishing attacks on the lock screen, Android PIN and iPhone Passcode☆12Mar 7, 2020Updated 6 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- This ia an Offensive Bruteforce Attack Tool, Just For Educational Purpose Only☆47Jan 14, 2026Updated 3 months ago
- Find someone's email address using Python and Rapportive☆21Jan 3, 2014Updated 12 years ago
- List of OSINT resources☆16Dec 17, 2020Updated 5 years ago
- how hackers Hackers can exploit SS7 vulnerabilities to intercept phone calls, SMS messages, and even track the real-time location of a ph…☆35Jan 11, 2025Updated last year
- Tool to perform brute force attack on TPLink routers☆16Jun 12, 2019Updated 6 years ago
- This is an osint tool which gathers useful and yet credible valid information about a phone number, user's email address and ip address a…☆32Mar 11, 2023Updated 3 years ago
- Disable admin-forced extensions on managed Chromebooks using the locked mode feature☆17Oct 25, 2023Updated 2 years ago
- 27 ways to bypass 2FA/otp☆53Jul 20, 2023Updated 2 years ago
- Brute Force Checkpoint Instagram [CrackerTOOL] v1.0☆20Jul 23, 2017Updated 8 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Fake (dummy) Payment Gateway for testing purposes.Can payment using cards as well as phone numbers.☆45May 23, 2021Updated 4 years ago
- 🐍 Python Exploit for CVE-2022-23935☆11Feb 10, 2023Updated 3 years ago
- Facebook Accounts Hacking Tool (By Brute Force Attack)☆11Jun 6, 2018Updated 7 years ago
- Clone from the Osmocom sim-tools.git with added features☆17Jan 22, 2021Updated 5 years ago
- ☆13Dec 21, 2019Updated 6 years ago
- Hacking Tool!! This Tools help you with ethical hacking, Social media hack, phone info, Gmail attack, phone number attack, user discovery…☆19Dec 23, 2024Updated last year
- A WiFi hacking Phishing tool for everyone.☆15Mar 31, 2023Updated 3 years ago
- The NSE Script plugin integrates with Criminal IP CTI search engine for network scanning, showing IP details like WHOIS, running products…☆16Nov 29, 2023Updated 2 years ago
- 《亿级流量网站架构核心技术》 - 笔记☆12Nov 25, 2018Updated 7 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- A visual developer tool for inspecting your iOS application data structures.☆13Jan 12, 2022Updated 4 years ago
- Gmail Hack Tool☆42Aug 4, 2023Updated 2 years ago
- Knative common scripts.☆26Apr 28, 2026Updated last week
- A fast dictionary attack tool (700,000+ candidates per second), that attacks a supported hash with a user-defined dictionary file's candi…☆22May 3, 2021Updated 5 years ago
- Creating a pocket-sized network pentesting device, offering standalone power, an LCD touch display, and flexibility to conduct on-the-go …☆52Jan 19, 2025Updated last year
- a simple keylogger that records hardware inputs like keyboard, mouse, microphone and webcam and sends it to your e-mail.☆18Oct 18, 2024Updated last year
- This is a repository focused on SS7 protocol research focusing on vulnerabilities, security flaws, attack methodologies, techniques, and …☆60Sep 22, 2024Updated last year
- A web application which acts as an IoT device when loaded in a smart phone browser. The data from the sensors are then used for Anomaly d…☆11Feb 4, 2021Updated 5 years ago
- RemClip is a C# project which permits to steal user clipboard data and send it to a remote web server under attacker control☆15Sep 2, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- A Rust port of BuntDB☆14Aug 5, 2021Updated 4 years ago
- Hijack I/O Kit to dispatch touch events to the iOS digitizer☆12Aug 5, 2019Updated 6 years ago
- Source Code from my YouTube Tutorials☆10Aug 23, 2025Updated 8 months ago
- Hey guys This a bash script tool to connect ssh Easily without any commands☆11Dec 6, 2023Updated 2 years ago
- 🏍Fast Home Delivery App of Grocery ,Medicines , Vegetables ,etc during lockdown . Client can send Handwritten List Photo ,Chat with Shop…☆11Jun 27, 2020Updated 5 years ago
- A transform to show the latest copy of the website from the Wayback Machine☆17Nov 25, 2014Updated 11 years ago
- Read & write magnetic card data to magspoof (ATtiny85)☆12May 27, 2019Updated 6 years ago