An adversary may utilize a sim swapping attack for defeating 2fa authentication
☆25Jan 29, 2024Updated 2 years ago
Alternatives and similar repositories for two-factor-authentication-sim-swapping
Users that are interested in two-factor-authentication-sim-swapping are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- An adversary may utilize a sim swapping attack for defeating 2fa authentication☆24Jan 29, 2024Updated 2 years ago
- Same @Mebus/cupp tool but best speed and Creates every possible word using the information you provide.☆21Nov 30, 2025Updated 3 months ago
- ☆13May 14, 2022Updated 3 years ago
- This script automates the process of unlocking Apple ID accounts by solving captcha challenges, verifying account details, and resetting …☆14Jan 24, 2026Updated last month
- Set of useful android network tools☆13Mar 9, 2021Updated 5 years ago
- ☆15Nov 22, 2023Updated 2 years ago
- Build custom OSINT tools and APIs (Ping, Traceroute, Scans, Archives, DNS, Scrape, Whois, Metadata & built-in database for more info) wit…☆110Jul 11, 2021Updated 4 years ago
- Recent cyber attacks reports & interesting analysis files☆15Apr 14, 2022Updated 3 years ago
- Brahmastra empowers security teams to fortify their defenses and identify potential vulnerabilities in their systems. This comprehensive …☆18Aug 20, 2023Updated 2 years ago
- iOS binary memory dump tool for iOS15+ (rootful, rootless)☆52Jan 15, 2024Updated 2 years ago
- Source code for the new SIM card flaw which lets hijack any phone just by sending SMS - Source Code + Demo Video☆131Oct 11, 2024Updated last year
- A simple compiling of notes and information / teachings on how stegonography works, and how we can use stegonography to execute system co…☆11Feb 27, 2022Updated 4 years ago
- WigleAPI-JSON in PHP with JSON Response☆14Nov 18, 2013Updated 12 years ago
- keep watching new bug bounty (vulnerability) postings.☆13Apr 7, 2024Updated last year
- knowledge about SS7 attack and hack☆28Jun 19, 2019Updated 6 years ago
- ☆10May 8, 2021Updated 4 years ago
- Python RAT with reverse connection and asymmetric encrypted communications☆16Jun 30, 2020Updated 5 years ago
- 🐍 Python Exploit for CVE-2022-23935☆11Feb 10, 2023Updated 3 years ago
- Persistent backdoor for Android devices with unlocked bootloader. Runs as root in unrestricted SELinux context and can hide itself from a…☆77May 11, 2024Updated last year
- Github Profile Readme☆13Jan 5, 2025Updated last year
- Bolster NEO API - Artificial intelligence based zero-hour phishing detection☆13Aug 10, 2021Updated 4 years ago
- ☆13Jan 6, 2026Updated 2 months ago
- Executes all scripts in /data/data/com.termux/files/home/boot in separate termux-sessions, 5 minutes after boot.☆11Mar 10, 2019Updated 7 years ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆15Nov 1, 2018Updated 7 years ago
- bugreport☆13May 19, 2019Updated 6 years ago
- Crack for Virt A Mate Game (Porn -18)☆23May 25, 2023Updated 2 years ago
- A visual developer tool for inspecting your iOS application data structures.☆13Jan 12, 2022Updated 4 years ago
- may the poc with you☆17May 6, 2022Updated 3 years ago
- Scalable URL Sandbox for analyzing URLs and Domains from phishing attacks☆196Oct 30, 2022Updated 3 years ago
- Use rpc null sessions to retrieve machine list, domain admin list, domain controllers☆13Dec 15, 2022Updated 3 years ago
- Indirect Syscall invocation via thread hijacking☆26May 5, 2023Updated 2 years ago
- A web application which acts as an IoT device when loaded in a smart phone browser. The data from the sensors are then used for Anomaly d…☆11Feb 4, 2021Updated 5 years ago
- RemClip is a C# project which permits to steal user clipboard data and send it to a remote web server under attacker control☆15Sep 2, 2024Updated last year
- This tool generates an undetectable Windows reverse shell PowerShell script. Users can configure IP and Port according to their requireme…☆20Jul 16, 2024Updated last year
- OPSEC related notes from various sources☆17Jun 22, 2015Updated 10 years ago
- Simulate device shutdown, ideal for use with anti-theft apps.☆19Dec 29, 2025Updated 2 months ago
- Hijack I/O Kit to dispatch touch events to the iOS digitizer☆12Aug 5, 2019Updated 6 years ago
- ☆13Oct 12, 2022Updated 3 years ago
- Example of Aave Flashloan as per https://medium.com/coinmonks/flashloan-101-a35132a2bbf8☆12Sep 13, 2020Updated 5 years ago