theapache64 / sim-jackerLinks
Source code for the new SIM card flaw which lets hijack any phone just by sending SMS - Source Code + Demo Video
☆129Updated last year
Alternatives and similar repositories for sim-jacker
Users that are interested in sim-jacker are comparing it to the libraries listed below
Sorting:
- This program capture SMS & IMSI numbers of cellphones around you.☆256Updated 3 years ago
- Fake-AP to perform Evil Twin Attack☆67Updated 7 years ago
- Arcane is a simple script designed to backdoor iOS packages (iphone-arm) and create the necessary resources for APT repositories.☆156Updated 5 years ago
- Network Attack wifi attack vlan attack arp attack Mac Attack Attack revealed etc../☆142Updated 5 years ago
- knowledge about SS7 attack and hack☆28Updated 6 years ago
- A script that creates a wifi hotspot on kali linux that can view usernames and passwords of ssl logins.☆69Updated 10 years ago
- SMS Spoofer for Social Engineering/Pentest Engagements☆47Updated 8 years ago
- GSM hacking tools and scripts☆57Updated 5 years ago
- SS7 tools and scripts☆230Updated 5 years ago
- Includes Spoof kit, Phishing Tool Kit, Credit Card Scanner, IP Sniffer, KeyLoggers, Tabnabbing, RansomWare, Viruses, RATS And More . . .☆47Updated 7 years ago
- Analysis of the XFS_DIRECT ATM malware used for jackpotting with a PI ZERO W and the P4WNP1 framework on board☆153Updated 6 years ago
- WIP - Chromium plugin for PhoneInfoga's Google Search scanner☆86Updated 4 years ago
- BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be us…☆59Updated 8 years ago
- Run interactive android exploits in linux.☆147Updated 11 months ago
- An easy tool to generate backdoor with msfvenom (a part from metasploit framework). This tool compiles a malware with popular payload and…☆134Updated 9 years ago
- Chaotic Crypto Stealth VPN for Anonymity and Untraceable Hacking Attacks with Linux and Android☆109Updated 5 years ago
- Make a Fake wireless access point aka Evil Twin....Easily!!☆71Updated 2 years ago
- Tools-kit For Metasploit☆37Updated 5 years ago
- Fast exploitation based on metasploit.☆74Updated 6 years ago
- Wireless Jammer to Disconnect Nearby Access-Points and Stations.☆215Updated 4 years ago
- A Complete Phishing Tool☆34Updated 5 years ago
- Send anonymous text messages with TOR and the TextBelt API☆68Updated 4 years ago
- Ransombile is a tool that can be used in different scenarios to compromise someone’s digital life when having physical access to a locked…☆83Updated 3 years ago
- Undetectable helps you to generate fully undetectable payload of metasploit which can bypass android antivirus.☆110Updated 2 years ago
- Using Social Engineering To Obtain WiFi Passwords☆102Updated 8 years ago
- All In One Pentesting Tool For Recon & Auditing , Phone Number Lookup , Header , SSH Scan , SSL/TLS Scan & Much More.☆86Updated last year
- This tool is phishing tool. Easy to use.☆19Updated 5 years ago
- Advanced MSF Payload Generator tool for Linux☆102Updated 10 months ago
- Make a 100% FUD Android Trojan and Bypass All Anti-Viruses + Android Google Play Protector☆100Updated 3 months ago
- ReconCobra Reconcobra is Foot printing software for Ultimate Information Gathering Kali, Parrot OS, Black Arch, Termux, Android Led TV I…☆148Updated 5 years ago