mapAccountHijack is a tool designed to carry out a MAP Account hijack attack, which exploits the Message Access Profile (MAP) in Bluetooth Classic, enables the theft of MFA and OTPs leading to the successful hijacking of accounts on services that rely on SMS OTPs during login or recovery. Tool leaks phone numbers, emails, can send and retrieve S…
☆77Feb 1, 2025Updated last year
Alternatives and similar repositories for mapAccountHijack
Users that are interested in mapAccountHijack are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- BlueToolkit is an extensible Bluetooth Classic vulnerability testing framework that helps uncover new and old vulnerabilities in Bluetoo…☆688Mar 5, 2026Updated 2 months ago
- Directory with Bluetooth exploits that is used in BlueToolkit☆22Sep 30, 2025Updated 7 months ago
- This master thesis project continuously collects and analyses Microsoft Windows kernel drivers using static and dynamic methods to help s…☆22Nov 4, 2024Updated last year
- Viber Osint helper tool to save your time through automation and help you find registered users.☆55Sep 17, 2023Updated 2 years ago
- Random OSINT idea tool thing☆27Jan 11, 2026Updated 3 months ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- CoRCTF 2025 - CoRPhone: Android Kernel Pwn☆53Sep 3, 2025Updated 8 months ago
- Python program Fileless-PE.py generates a Python script (PEloader.py) to load a DLL or EXE file from a given URL. It provides functionali…☆31Jul 17, 2024Updated last year
- The ultimate Red Team toolkit for phishing operations.☆68Updated this week
- It's package manager for hacker's. pegasus-two manage large number's of hacking tools that can be installed on single click. Using pegasu…☆30Mar 3, 2026Updated 2 months ago
- PoC of CVE-2022-20474☆20Feb 3, 2025Updated last year
- ☆19Aug 26, 2020Updated 5 years ago
- An adversary may utilize a sim swapping attack for defeating 2fa authentication☆26Jan 29, 2024Updated 2 years ago
- Medusa combo files, Hashcat rules and dictionaries, JRT rules☆14Oct 20, 2022Updated 3 years ago
- zygisk插件:用于unity游戏hook☆17Dec 27, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Advance tool for termux customisation☆16Aug 21, 2021Updated 4 years ago
- AIDA64DRIVER Elevation of Privilege Vulnerability☆17Oct 25, 2024Updated last year
- Offensive recon with GitHub Actions☆12Aug 25, 2024Updated last year
- A Project for people to study android svc.☆26Aug 12, 2022Updated 3 years ago
- 「💥」CVE-2022-26134 - Confluence Pre-Auth RCE☆14Jun 19, 2022Updated 3 years ago
- Seven different DLL injection techniques in one single project.☆12May 19, 2020Updated 5 years ago
- BLURtooth: Exploiting Cross-Transport Key Derivation in Bluetooth Classic and Bluetooth Low Energy [CVE-2020-15802] [CVE-2022-20361]☆21Aug 17, 2022Updated 3 years ago
- havoc kaine plugin to mitigate PAGE_GUARD protected image headers using JOP gadgets☆42Aug 6, 2024Updated last year
- ☆18Jun 25, 2024Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- 𝘔𝘢𝘯𝘺 𝘰𝘧 𝘵𝘩𝘦𝘴𝘦 𝘴𝘤𝘳𝘪𝘱𝘵𝘴 𝘢𝘳𝘦 𝘤𝘰𝘭𝘭𝘦𝘤𝘵𝘦𝘥 𝘧𝘳𝘰𝘮 𝘤𝘰𝘶𝘳𝘴𝘦𝘴, 𝘣𝘭𝘰𝘨𝘴, 𝘤𝘰𝘮𝘮𝘶𝘯𝘪𝘵𝘺 𝘳𝘦𝘴𝘰𝘶𝘳𝘤�…☆28Nov 30, 2025Updated 5 months ago
- Home of https://redteam.guide☆15Apr 1, 2026Updated last month
- Sliver agents for Mythic☆48Nov 18, 2024Updated last year
- ☆19Dec 29, 2019Updated 6 years ago
- 「🔎」CORS vulnerability scanner☆12Dec 7, 2024Updated last year
- General control of Android installations.☆15Jun 4, 2025Updated 11 months ago
- Digging into private data through Sonarcloud public projects☆11Sep 13, 2024Updated last year
- ☆27Nov 8, 2023Updated 2 years ago
- Basics on commands/tools/info on how to do a forensic analysis of a mobile phone☆34Apr 27, 2023Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆17May 7, 2025Updated last year
- Modern cybersecurity tools platform built with React and TypeScript. This provides a collection of essential security tools with a sleek,…☆26Jul 19, 2025Updated 9 months ago
- Another Portable Executable files analysing stuff☆21May 28, 2011Updated 14 years ago
- ☆57Mar 19, 2023Updated 3 years ago
- Abusing autoElevate - Fully Undetectable UAC Bypass exploit☆11Jul 15, 2022Updated 3 years ago
- 「🍯」Simple low-interaction honeypot with FTP, Telnet and Web☆12Dec 7, 2024Updated last year
- how hackers Hackers can exploit SS7 vulnerabilities to intercept phone calls, SMS messages, and even track the real-time location of a ph…☆35Jan 11, 2025Updated last year