sgxgsx / mapAccountHijackLinks
mapAccountHijack is a tool designed to carry out a MAP Account hijack attack, which exploits the Message Access Profile (MAP) in Bluetooth Classic, enables the theft of MFA and OTPs leading to the successful hijacking of accounts on services that rely on SMS OTPs during login or recovery. Tool leaks phone numbers, emails, can send and retrieve S…
☆50Updated 5 months ago
Alternatives and similar repositories for mapAccountHijack
Users that are interested in mapAccountHijack are comparing it to the libraries listed below
Sorting:
- Exfiltrate sensitive user data from apps on Android 12 and 13 using CVE-2024-0044 vulnerability remotely☆70Updated 11 months ago
- Rubber Ducky powered by NeoKey☆25Updated last year
- Directory with Bluetooth exploits that is used in BlueToolkit☆15Updated 3 weeks ago
- Basics on commands/tools/info on how to do a forensic analysis of a mobile phone☆28Updated 2 years ago
- This repository contains a few leaked files of HookBot.☆104Updated last year
- A tool for generating detailed, locally-processed reports from iOS backups, supporting encrypted and unencrypted data.☆60Updated 8 months ago
- Scripts to set up your own Android 📱 app hacking lab☆88Updated last year
- Bluekit is an extensible engine, CLI tool used in BlueToolkit☆11Updated last month
- BlueStacks privilege escalation through VM backdooring☆21Updated last year
- 🔮 Python Remote administration tool via telegram☆52Updated 2 months ago
- Pyfuscator is a Python tool designed to obfuscate Python scripts by encoding and encrypting them. It allows you to transform your Python …☆27Updated 11 months ago
- Social Engineering Browser Update Attack.☆56Updated last year
- Android App Pin Security Issue Allowing Unauthorized Payments via Google Wallet☆71Updated last year
- Hosted Reverse Shell generator with a ton of functionality. -- (Great for CTFs)☆17Updated 11 months ago
- Automation of some MAPT activities and interaction with the mobile Android device.☆74Updated last week
- Android devices using ADB via the Shodan API. It prompts the user for a command payload, then establishes TCP connections to devices with…☆12Updated 4 months ago
- Tool to Disable User Lock☆26Updated 2 years ago
- Basics on commands/tools/info on how to do binary exploitation on a mobile phone☆53Updated 2 years ago
- Python Exploitation is a collection of special tools for providing high quality penetration testing using pure python programming languag…☆45Updated 9 months ago
- Bash Script with 4 ways to get persistence in Linux systems WITHOUT root permisions☆17Updated 2 years ago
- This is a exploit with the capability to control ip camera movement even without a username and password.☆58Updated 3 months ago
- hiding in plain sight: part 2☆45Updated last year
- An Open Source Intelligence Framework to investigate and keep track of the investigation of a certain individual☆15Updated last year
- This repository hosts PoC exploits for vulnerabilities I've discovered, provided for education and to highlight the importance of system …☆18Updated 2 years ago
- Hacking with PasteJacking technique☆22Updated last year
- The provided Python program, Nim-Backdoor.py, generates a Nim program that operates as a backdoor, allowing remote command execution via …☆47Updated 11 months ago
- "Ghost (RAT)" -> Reverse shell and management console for Windows☆18Updated 3 years ago
- Pentesting Suite☆30Updated 2 weeks ago
- ☆19Updated 2 years ago
- PassBreaker☆63Updated last year