Cookie Consent by Free Privacy Policy Generator ๐Ÿ“Œ Fake-Sms - A Simple Command Line Tool Using Which You Can Skip Phone Number Based SMS Verification By Using A Temporary Phone Number That Acts Like A Proxy

๐Ÿ  Team IT Security News

TSecurity.de ist eine Online-Plattform, die sich auf die Bereitstellung von Informationen,alle 15 Minuten neuste Nachrichten, Bildungsressourcen und Dienstleistungen rund um das Thema IT-Sicherheit spezialisiert hat.
Ob es sich um aktuelle Nachrichten, Fachartikel, Blogbeitrรคge, Webinare, Tutorials, oder Tipps & Tricks handelt, TSecurity.de bietet seinen Nutzern einen umfassenden รœberblick รผber die wichtigsten Aspekte der IT-Sicherheit in einer sich stรคndig verรคndernden digitalen Welt.

16.12.2023 - TIP: Wer den Cookie Consent Banner akzeptiert, kann z.B. von Englisch nach Deutsch รผbersetzen, erst Englisch auswรคhlen dann wieder Deutsch!

Google Android Playstore Download Button fรผr Team IT Security



๐Ÿ“š Fake-Sms - A Simple Command Line Tool Using Which You Can Skip Phone Number Based SMS Verification By Using A Temporary Phone Number That Acts Like A Proxy


๐Ÿ’ก Newskategorie: IT Security Nachrichten
๐Ÿ”— Quelle: feedproxy.google.com


A simple command line tool using which you can skip phone number based SMS verification by using a temporary phone number that acts like a proxy.

Note-1: This is just an experimental tool, do not use this in any banking transactions. Unethical use of this tool is strictly not encouraged."

Note-2: The tool uses upmasked, A Eurpoean service provider, data will be stored on their servers, make sure you agree to EU Data governance laws and GDPR. I recommend you not to use this for any personal transaction which reveals your identity.


Features:
  • Written in Go-1.15 (with modules support enabled)
  • Provides an interactive CLI, which is easier to use.
  • Provides a local file based DB to save and manage a list of fake phone numbers to help you remember and reuse.
  • Unofficial client of upmasked

Requirements:
  • Go programming language - 1.15+

To build:

The build process is simple, it is just like building any other Go module. Follow the steps below:

export GOBIN=$PWD/bin
go install

This will build the binary and place it in bin/. You can also consider using the pre-built binary which is available under bin/


Steps to use:
  1. Register a number in local DB: You can register a number by selecting one of the available numbers as shown below.


  1. Get the messages from any registered number: You can select a number which was saved in step-1 and view its messages as a list. The tool will also save the dump as json in the format ${PWD}/selected-phone-number.json. As shown below:


  1. Optionally, you can choose to delete the rembered numbers or list them.

Acknowledgements

The similar tool is also available in pure shell script. Check this out.


Contributing

The tool is very simple and I don't think there is any major feature missing. But I would welcome any kind of suggestion, enhancements or a bug-fix from the community. Please open an issue to discuss or directly make a PR!!



...



๐Ÿ“Œ hflow - a super-simple, command-line, http debugging proxy for containers and servers


๐Ÿ“ˆ 32.01 Punkte

๐Ÿ“Œ Even if you can't write assembly like a poet, you can read disassembly like a hunter


๐Ÿ“ˆ 31.1 Punkte

๐Ÿ“Œ TempoMail -- Command Line Temporary Email in Linux


๐Ÿ“ˆ 30.83 Punkte

๐Ÿ“Œ IBM Domino 9.0/9.0.1 Command Line nsd.exe Command Line Argument privilege escalation


๐Ÿ“ˆ 29.56 Punkte

๐Ÿ“Œ Cisco IOS XR Command Line line os command injection


๐Ÿ“ˆ 29.56 Punkte

๐Ÿ“Œ I like my gaming monitors like I like my men, simple, cheap and great pixel clarity... huh? Anyway, this monitor nails it


๐Ÿ“ˆ 29.21 Punkte

๐Ÿ“Œ Crossing the Line: When Cyberattacks Become Acts of War


๐Ÿ“ˆ 29.13 Punkte

๐Ÿ“Œ macOS users targeted by EvilQuest Ransomware which acts strange


๐Ÿ“ˆ 28.82 Punkte

๐Ÿ“Œ Resource-Counter - This Command Line Tool Counts The Number Of Resources In Different Categories Across Amazon Regions


๐Ÿ“ˆ 28.33 Punkte

๐Ÿ“Œ Simple command line forensics tool for tracking USB device artifacts (history of USB events) on GNU/Linux


๐Ÿ“ˆ 28.16 Punkte

๐Ÿ“Œ Usbrip - Simple Command Line Forensics Tool For Tracking USB Device Artifacts (History Of USB Events) On GNU/Linux


๐Ÿ“ˆ 28.16 Punkte

๐Ÿ“Œ Simple command line tool concept for connecting to wifi networks


๐Ÿ“ˆ 28.16 Punkte

๐Ÿ“Œ Proxy vs. VPN: A browser-based proxy isn't a VPN, but you might want one anyway


๐Ÿ“ˆ 27.55 Punkte

๐Ÿ“Œ Proxy vs. VPN: A browser-based proxy isn't a VPN, but you might want one anyway


๐Ÿ“ˆ 27.55 Punkte

๐Ÿ“Œ Enjin: Weak Email Verification: Newly Registered Users Can Bypass Email Verification Step and Log In


๐Ÿ“ˆ 27.04 Punkte

๐Ÿ“Œ Facebook acts like a law-breaking โ€˜digital gangsterโ€™, says official report


๐Ÿ“ˆ 27.01 Punkte

๐Ÿ“Œ Facebook acts like a law-breaking โ€˜digital gangsterโ€™, says official report


๐Ÿ“ˆ 27.01 Punkte

๐Ÿ“Œ New MagSafe iPhone wallet acts like it has an AirTag inside


๐Ÿ“ˆ 27.01 Punkte

๐Ÿ“Œ This iPhone wallet/stand acts like it has built-in AirTag [Review] โ˜…โ˜…โ˜…โ˜…โ˜†


๐Ÿ“ˆ 27.01 Punkte

๐Ÿ“Œ Strange New Phase of Matter Acts Like It Has Two Time Dimensions


๐Ÿ“ˆ 27.01 Punkte

๐Ÿ“Œ If You Can Say It, Now You Can See It: RunWayโ€™s Latest Artificial Intelligence Tool Can Generate Videos With Nothing But Words


๐Ÿ“ˆ 26.87 Punkte

๐Ÿ“Œ Which terminal emulator can do quick on-screen searches which can be copied to the cursor?


๐Ÿ“ˆ 26.81 Punkte

๐Ÿ“Œ How to determine number of CPUs on Linux using command line


๐Ÿ“ˆ 26.79 Punkte

๐Ÿ“Œ Apple's new privacy tool lets you choose which apps can see and share your data. Here's what you need to know


๐Ÿ“ˆ 26.68 Punkte

๐Ÿ“Œ Remove Background from Video and Images with a simple command line interface, using machine learning


๐Ÿ“ˆ 26.62 Punkte

๐Ÿ“Œ Use oathtool Linux command line for 2 step verification (2FA)


๐Ÿ“ˆ 26.03 Punkte











matomo