sgxgsx / mapAccountHijack
mapAccountHijack is a tool designed to carry out a MAP Account hijack attack, which exploits the Message Access Profile (MAP) in Bluetooth Classic, enables the theft of MFA and OTPs leading to the successful hijacking of accounts on services that rely on SMS OTPs during login or recovery. Tool leaks phone numbers, emails, can send and retrieve S…
☆38Updated 2 weeks ago
Alternatives and similar repositories for mapAccountHijack:
Users that are interested in mapAccountHijack are comparing it to the libraries listed below
- BlueStacks privilege escalation through VM backdooring☆19Updated 7 months ago
- Directory with Bluetooth exploits that is used in BlueToolkit☆10Updated 2 weeks ago
- LNK-Dropper Builder☆19Updated 5 months ago
- Rubber Ducky powered by NeoKey☆22Updated 8 months ago
- Exfiltrate sensitive user data from apps on Android 12 and 13 using CVE-2024-0044 vulnerability remotely☆65Updated 6 months ago
- This repository hosts PoC exploits for vulnerabilities I've discovered, provided for education and to highlight the importance of system …☆18Updated last year
- A PHP script demonstrating cookie stealing by capturing and logging request information, including the victim's cookie, IP address, HTTP …☆34Updated last year
- Python script that generates Visual Basic Script (VBS) stagers for executing PowerShell scripts directly from specified URLs. It provides…☆12Updated 9 months ago
- ☆13Updated last year
- hiding in plain sight: part 2☆44Updated 7 months ago
- Detect code obfuscation through text classification in the detection process.☆44Updated last year
- Android devices using ADB via the Shodan API. It prompts the user for a command payload, then establishes TCP connections to devices with…☆10Updated 5 months ago
- This tool is useful in case you want to evade the detection based on simple rules when trying to dump the SAM, SYSTEM or SECURITY hives u…☆10Updated 2 years ago
- 🔮 Python Remote administration tool via telegram☆47Updated 11 months ago
- A PowerShell script that simplifies life and therefore... phishing.☆17Updated 2 years ago
- There were no proper POCs for CVE-2023-30533 so I made one. (Reported by Vsevolod Kokorin)☆9Updated last year
- PowerSploit - A PowerShell Post-Exploitation Framework☆23Updated 2 years ago
- A complete security assessment tool that supports common web security issues scanning and custom POC | Be sure to read the document befor…☆19Updated 4 months ago
- aiohttp LFI (CVE-2024-23334)☆25Updated 11 months ago
- Reverse backdoor written in PowerShell and obfuscated with Python. It generates payloads for popular hacking devices like Flipper Zero an…☆29Updated last year
- This repository contains a few leaked files of HookBot.☆104Updated last year
- Scripts to set up your own Android 📱 app hacking lab☆78Updated 7 months ago
- Collection of (4000+) malicious rMQR Codes for Penetration testing, Vulnerability assessments, Red Team operations, Bug Bounty and more☆42Updated 3 months ago
- GitHub CVE Repository Hunt☆18Updated 6 months ago
- ☆19Updated last year
- Auto exploitation tool for CVE-2024-24401.☆32Updated 5 months ago
- Unauthorized Access to Metadata and User Data like CTF☆26Updated 2 months ago
- Python program Fileless-PE.py generates a Python script (PEloader.py) to load a DLL or EXE file from a given URL. It provides functionali…☆22Updated 7 months ago
- The tool that bypasses the firewall's Application Based Rules and lets you connect to anywhere, ANY IP, ANY PORT and ANY APPLICATION.☆60Updated 6 months ago