An adversary may utilize a sim swapping attack for defeating 2fa authentication
☆26Jan 29, 2024Updated 2 years ago
Alternatives and similar repositories for two-factor-authentication-sim-swapping
Users that are interested in two-factor-authentication-sim-swapping are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- An adversary may utilize a sim swapping attack for defeating 2fa authentication☆25Jan 29, 2024Updated 2 years ago
- Cyber Kill Chain is a model that Lockheed Martin created for understanding (Describe the sequence of events) and stopping cyberattacks☆10Jan 29, 2024Updated 2 years ago
- ☆13May 14, 2022Updated 3 years ago
- This script automates the process of unlocking Apple ID accounts by solving captcha challenges, verifying account details, and resetting …☆14Jan 24, 2026Updated 3 months ago
- ☆15Nov 22, 2023Updated 2 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Quantum zero-day exploit Hunting for vulnerabilities as small as a quantum particle☆13Jun 13, 2025Updated 10 months ago
- Custom security distro for remote penetration testing☆56Mar 26, 2021Updated 5 years ago
- A collection of attacks metadata that were used in my previous pen-test tools☆17Dec 23, 2022Updated 3 years ago
- Recent cyber attacks reports & interesting analysis files☆15Apr 14, 2022Updated 4 years ago
- Demo collection for Qml-Browser☆11May 26, 2023Updated 2 years ago
- Agile Sandbox for analyzing Windows, Linux and macOS malware and execution behaviors☆74Nov 12, 2023Updated 2 years ago
- ☆16May 6, 2015Updated 10 years ago
- Brahmastra empowers security teams to fortify their defenses and identify potential vulnerabilities in their systems. This comprehensive …☆17Aug 20, 2023Updated 2 years ago
- iOS binary memory dump tool for iOS15+ (rootful, rootless)☆52Jan 15, 2024Updated 2 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- customize Synology DSM devices☆12Jan 11, 2023Updated 3 years ago
- AI designed for cybersecurity professionals, ethical hackers, Malware, and penetration testers. It assists in vulnerability analysis, sec…☆18Dec 26, 2025Updated 4 months ago
- Search engine plugins for qBittorent☆17Feb 9, 2026Updated 2 months ago
- A simple compiling of notes and information / teachings on how stegonography works, and how we can use stegonography to execute system co…☆11Feb 27, 2022Updated 4 years ago
- A tool for game - Dauntless☆14Jul 10, 2019Updated 6 years ago
- SMR-Portal: an online platform for integrative analysis of GWAS and xQTL data to identify complex trait genes.☆22Dec 2, 2025Updated 5 months ago
- knowledge about SS7 attack and hack☆28Jun 19, 2019Updated 6 years ago
- keep watching new bug bounty (vulnerability) postings.☆11Apr 7, 2024Updated 2 years ago
- dump network packet and log to database☆10Jul 24, 2022Updated 3 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- ☆10May 8, 2021Updated 4 years ago
- Logs the I.P address(IPv4) of the device present on LAN and performs OS guessing .☆10Apr 24, 2022Updated 4 years ago
- Python RAT with reverse connection and asymmetric encrypted communications☆14Jun 30, 2020Updated 5 years ago
- 🐍 Python Exploit for CVE-2022-23935☆11Feb 10, 2023Updated 3 years ago
- Persistent backdoor for Android devices with unlocked bootloader. Runs as root in unrestricted SELinux context and can hide itself from a…☆78May 11, 2024Updated last year
- Github Profile Readme☆13Jan 5, 2025Updated last year
- sample code to perform aave flashloan with OrFeed https://docs.aave.com/developers/tutorials/performing-a-flash-loan☆10Jan 24, 2023Updated 3 years ago
- Hacking Tool!! This Tools help you with ethical hacking, Social media hack, phone info, Gmail attack, phone number attack, user discovery…☆19Dec 23, 2024Updated last year
- Tool for finding Known Vulnerability of an ip address☆13Nov 13, 2024Updated last year
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- This Project is in process and i will start working on it this weekend. It is used to call victims with a botvoice to ask for their 2fa c…☆10Mar 28, 2022Updated 4 years ago
- ☆13Apr 22, 2026Updated last week
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆15Nov 1, 2018Updated 7 years ago
- The NSE Script plugin integrates with Criminal IP CTI search engine for network scanning, showing IP details like WHOIS, running products…☆16Nov 29, 2023Updated 2 years ago
- Executes all scripts in /data/data/com.termux/files/home/boot in separate termux-sessions, 5 minutes after boot.☆11Mar 10, 2019Updated 7 years ago
- Prevent Mouse key Back/Forward and Windows Key so you can use them for Push to Talk keys in Discord and other apps.☆14Aug 31, 2025Updated 8 months ago
- bugreport☆13May 19, 2019Updated 6 years ago