sgxgsx / mapAccountHijackLinks
mapAccountHijack is a tool designed to carry out a MAP Account hijack attack, which exploits the Message Access Profile (MAP) in Bluetooth Classic, enables the theft of MFA and OTPs leading to the successful hijacking of accounts on services that rely on SMS OTPs during login or recovery. Tool leaks phone numbers, emails, can send and retrieve S…
☆56Updated 9 months ago
Alternatives and similar repositories for mapAccountHijack
Users that are interested in mapAccountHijack are comparing it to the libraries listed below
Sorting:
- Exfiltrate sensitive user data from apps on Android 12 and 13 using CVE-2024-0044 vulnerability remotely☆73Updated last year
- Rubber Ducky powered by NeoKey☆27Updated last year
- A tool for generating detailed, locally-processed reports from iOS backups, supporting encrypted and unencrypted data.☆61Updated last year
- Directory with Bluetooth exploits that is used in BlueToolkit☆17Updated last month
- Bluekit is an extensible engine, CLI tool used in BlueToolkit☆13Updated last month
- BlueStacks privilege escalation through VM backdooring☆21Updated last year
- Basics on commands/tools/info on how to do a forensic analysis of a mobile phone☆29Updated 2 years ago
- This repository contains a few leaked files of HookBot.☆106Updated 2 years ago
- 🔮 Python Remote administration tool via telegram☆54Updated 7 months ago
- A Sophisticated, Automated, AI-Driven, State-Sponsored Cyber-Espionage/Counter-Espionage & Zero Click AI-Gen Supply Chain Attack Framewor…☆56Updated 6 months ago
- Android devices using ADB via the Shodan API. It prompts the user for a command payload, then establishes TCP connections to devices with…☆16Updated 8 months ago
- What is Phone Track? So phonetrack is a type of OSINT that is used to track someone's location just based on their telephone number☆79Updated 2 years ago
- Scripts to set up your own Android 📱 app hacking lab☆93Updated last year
- Interactive shell to execute commands anonymously using Proxychains and Tor☆48Updated 2 years ago
- This is a exploit with the capability to control ip camera movement even without a username and password.☆70Updated 7 months ago
- Python Exploitation is a collection of special tools for providing high quality penetration testing using pure python programming languag…☆48Updated last year
- Basics on commands/tools/info on how to do binary exploitation on a mobile phone☆56Updated 2 years ago
- Tool to Disable User Lock☆26Updated 3 years ago
- Hacking Hotspots: Pre-Auth Remote Code Execution, Arbitrary SMS & Adjacent Attacks on 5G & 4G/LTE Routers☆89Updated 2 months ago
- TrafficWatch, a packet sniffer tool, allows you to monitor and analyze network traffic from PCAP files☆119Updated last year
- IPAnalyzer is an IP Address Tracker OSINT ethical hacking tool built for Linux distributions, designed to gather detailed information abo…☆49Updated 2 months ago
- A tool to crack WPA2 passphrase with PMKID value without clients or de-authentication☆226Updated 2 years ago
- Hacking with PasteJacking technique☆22Updated last year
- Social Engineering Browser Update Attack.☆58Updated 2 years ago
- Pdf-exploit builder Non-Silent on C#☆14Updated last year
- Discord bot for the Shodan API - OSINT tool☆80Updated last year
- Clipboard poisoning attack.☆58Updated 5 years ago
- Bash Script with 4 ways to get persistence in Linux systems WITHOUT root permisions☆17Updated 3 years ago
- Introducing the Ransomware Builder – an educational tool with a sleek, modern GUI that makes it easy for anyone to create their own ranso…☆17Updated last year
- ☆19Updated 2 years ago