An adversary may utilize a sim swapping attack for defeating 2fa authentication
☆26Jan 29, 2024Updated 2 years ago
Alternatives and similar repositories for two-factor-authentication-sim-swapping
Users that are interested in two-factor-authentication-sim-swapping are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- An adversary may utilize a sim swapping attack for defeating 2fa authentication☆26Jan 29, 2024Updated 2 years ago
- Cyber Kill Chain is a model that Lockheed Martin created for understanding (Describe the sequence of events) and stopping cyberattacks☆10Jan 29, 2024Updated 2 years ago
- ☆13May 14, 2022Updated 4 years ago
- Collection of exploits that were verified by an automated system☆13Jun 17, 2021Updated 4 years ago
- OTP verification is widely used in 2FA, with tools like OTP bots and generators enabling automation. OTP bypass techniques target platfor…☆36Updated this week
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- This script automates the process of unlocking Apple ID accounts by solving captcha challenges, verifying account details, and resetting …☆14Jan 24, 2026Updated 3 months ago
- Set of useful android network tools☆15Mar 9, 2021Updated 5 years ago
- Custom security distro for remote penetration testing☆56Mar 26, 2021Updated 5 years ago
- Recent cyber attacks reports & interesting analysis files☆15Apr 14, 2022Updated 4 years ago
- Agile Sandbox for analyzing Windows, Linux and macOS malware and execution behaviors☆74Nov 12, 2023Updated 2 years ago
- ☆16May 6, 2015Updated 11 years ago
- iOS binary memory dump tool for iOS15+ (rootful, rootless)☆53Jan 15, 2024Updated 2 years ago
- customize Synology DSM devices☆12Jan 11, 2023Updated 3 years ago
- Source code for the new SIM card flaw which lets hijack any phone just by sending SMS - Source Code + Demo Video☆136Oct 11, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- AI designed for cybersecurity professionals, ethical hackers, Malware, and penetration testers. It assists in vulnerability analysis, sec…☆18Dec 26, 2025Updated 4 months ago
- Search engine plugins for qBittorent☆17Feb 9, 2026Updated 3 months ago
- ☆12Jun 12, 2021Updated 4 years ago
- WigleAPI-JSON in PHP with JSON Response☆14Nov 18, 2013Updated 12 years ago
- knowledge about SS7 attack and hack☆29Jun 19, 2019Updated 6 years ago
- Interface for Image-Related Deep Learning Models (E.g. NSFW, MAYBE and SFW)☆35Apr 15, 2022Updated 4 years ago
- Amazon-Aged-Account-Gen☆10Apr 7, 2023Updated 3 years ago
- Checklist of simple and not so simple things to enhance your OPSEC.☆20Jul 24, 2018Updated 7 years ago
- Persistent backdoor for Android devices with unlocked bootloader. Runs as root in unrestricted SELinux context and can hide itself from a…☆77May 11, 2024Updated 2 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- sample code to perform aave flashloan with OrFeed https://docs.aave.com/developers/tutorials/performing-a-flash-loan☆10Jan 24, 2023Updated 3 years ago
- Hacking Tool!! This Tools help you with ethical hacking, Social media hack, phone info, Gmail attack, phone number attack, user discovery…☆19Dec 23, 2024Updated last year
- Bolster NEO API - Artificial intelligence based zero-hour phishing detection☆13Aug 10, 2021Updated 4 years ago
- ELKFH - Elastic, Logstash, Kibana, Filebeat and Honeypot (HTTP, HTTPS, SSH, RDP, VNC, Redis, MySQL, MONGO, SMB, LDAP)☆48Apr 26, 2021Updated 5 years ago
- This Project is in process and i will start working on it this weekend. It is used to call victims with a botvoice to ask for their 2fa c…☆10Mar 28, 2022Updated 4 years ago
- 🧬 Mitre Interactive Network Graph (APTs, Malware, Tools, Techniques & Tactics)☆105Apr 26, 2022Updated 4 years ago
- Executes all scripts in /data/data/com.termux/files/home/boot in separate termux-sessions, 5 minutes after boot.☆11Mar 10, 2019Updated 7 years ago
- The NSE Script plugin integrates with Criminal IP CTI search engine for network scanning, showing IP details like WHOIS, running products…☆16Nov 29, 2023Updated 2 years ago
- Melee: Tool to Detect Infections in MySQL Instances☆23Aug 6, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- bugreport☆13May 19, 2019Updated 7 years ago
- SQL Detector Tool In Go Language☆22Jan 10, 2023Updated 3 years ago
- Crack for Virt A Mate Game (Porn -18)☆25May 25, 2023Updated 2 years ago
- may the poc with you☆16May 6, 2022Updated 4 years ago
- MCP Server for faster development iteration☆48Sep 17, 2025Updated 8 months ago
- This ia an Offensive Bruteforce Attack Tool, Just For Educational Purpose Only☆49Jan 14, 2026Updated 4 months ago
- Scalable URL Sandbox for analyzing URLs and Domains from phishing attacks☆197Oct 30, 2022Updated 3 years ago