simplerhacking / SS7-Vulnerability-Research-and-TutorialLinks
This is a repository focused on SS7 protocol research focusing on vulnerabilities, security flaws, attack methodologies, techniques, and mitigation strategies. Includes educational tutorials and resources for cybersecurity professionals, researchers, and enthusiasts looking to learn about this specialized and complex attack.
☆42Updated last year
Alternatives and similar repositories for SS7-Vulnerability-Research-and-Tutorial
Users that are interested in SS7-Vulnerability-Research-and-Tutorial are comparing it to the libraries listed below
Sorting:
- An adversary may utilize a sim swapping attack for defeating 2fa authentication☆22Updated 2 years ago
- mapAccountHijack is a tool designed to carry out a MAP Account hijack attack, which exploits the Message Access Profile (MAP) in Bluetoot…☆65Updated 11 months ago
- An adversary may utilize a sim swapping attack for defeating 2fa authentication☆24Updated 2 years ago
- Android devices using ADB via the Shodan API. It prompts the user for a command payload, then establishes TCP connections to devices with…☆14Updated 3 weeks ago
- 🔮 Python Remote administration tool via telegram☆55Updated 9 months ago
- A tool to crack WPA2 passphrase with PMKID value without clients or de-authentication☆224Updated 2 years ago
- Tool to make OSINT to phone numbers with the help of APILayer, using its api together with Number Verification API. 🕵🏽♂️☆66Updated last year
- How to set up and install Ss7 and Sigtran Adapt☆31Updated last year
- IoT Camera Reconnaissance and Live Viewer☆170Updated last year
- Rubber Ducky powered by NeoKey☆28Updated last year
- This is a exploit with the capability to control ip camera movement even without a username and password.☆76Updated 9 months ago
- Clipboard poisoning attack.☆58Updated 5 years ago
- A Sophisticated, Automated, AI-Driven, State-Sponsored Cyber-Espionage/Counter-Espionage & Zero Click AI-Gen Supply Chain Attack Framewor…☆68Updated 9 months ago
- KeyloggerScreenshot is an intelligent tool which logs keys, makes a Screenshot every 20 seconds, recordes the mouse click with x and y po…☆130Updated 3 months ago
- ☆22Updated 2 years ago
- Automation script to download missing tools and configurate kali linux for various cybersecurity categories☆53Updated 2 months ago
- AirHunt is a versatile and user-friendly wireless network hacking toolkit designed for security professionals and enthusiasts. With a wid…☆66Updated 2 years ago
- A tool to automatically redirect all traffic through the TOR and change the IP every 0 to x seconds. And provides a custom MAC address. <…☆98Updated 2 weeks ago
- Obtain a profile from car plate, including car jacking report, verified data related to vehicles registered in the Mexican SCT..☆39Updated 2 years ago
- IPAnalyzer is an IP Address Tracker OSINT ethical hacking tool built for Linux distributions, designed to gather detailed information abo…☆56Updated 2 months ago
- PEGASUS-NEO is a comprehensive penetration testing framework designed for security professionals and ethical hackers. It combines multipl…☆111Updated 2 weeks ago
- Social Media Search Tool☆15Updated last year
- Hacking Hotspots: Pre-Auth Remote Code Execution, Arbitrary SMS & Adjacent Attacks on 5G & 4G/LTE Routers☆96Updated 4 months ago
- End-to-End Encrypted Messaging via GitHub Gists☆27Updated 9 months ago
- DarkStar is a Premium Hacking Tools. You can buy by contacting me☆26Updated last year
- Embed malware, apks, executables or any other binary file into a PDF, or generate a PDF with malicious link encrusted.☆109Updated 2 years ago
- The provided Python program, Nim-Backdoor.py, generates a Nim program that operates as a backdoor, allowing remote command execution via …☆64Updated last year
- Interactive shell to execute commands anonymously using Proxychains and Tor☆48Updated 2 years ago
- 🕵️ Track down social media profiles using a specific username across multiple social network platforms☆62Updated last month
- PassDetective is a command-line tool that scans shell command history to detect mistakenly written passwords, API keys, and secrets. Usin…☆144Updated 2 weeks ago