Fake SMS : Skip Phone Verification By Using A Proxy

Fake SMS is a simple command line tool using which you can skip phone number based SMS verification by using a temporary phone number that acts like a proxy.

Note-1: This is just an experimental tool, do not use this in any banking transactions. Unethical use of this tool is strictly not encouraged.”

Note-2: The tool uses upmasked, A Eurpoean service provider, data will be stored on their servers, make sure you agree to EU Data governance laws and GDPR. I recommend you not to use this for any personal transaction which reveals your identity.

Features

  • Written in Go-1.15 (with modules support enabled)
  • Provides an interactive CLI, which is easier to use.
  • Provides a local file based DB to save and manage a list of fake phone numbers to help you remember and reuse.
  • Unofficial client of upmasked

Requirements

  • Go programming language – 1.15+

To build:

The build process is simple, it is just like building any other Go module. Follow the steps below:

export GOBIN=$PWD/bin
go install

This will build the binary and place it in bin/. You can also consider using the pre-built binary which is available under bin/

Steps to use:

  • Register a number in local DB: You can register a number by selecting one of the available numbers as shown below.
  • Get the messages from any registered number: You can select a number which was saved in step-1 and view its messages as a list. The tool will also save the dump as json in the format ${PWD}/selected-phone-number.json. As shown below:
  • Optionally, you can choose to delete the rembered numbers or list them.

Acknowledgements

The similar tool is also available in pure shell script. Check this out.

Contributing

The tool is very simple and I don’t think there is any major feature missing. But I would welcome any kind of suggestion, enhancements or a bug-fix from the community. Please open an issue to discuss or directly make a PR!!

R K

Recent Posts

ModTask – Task Scheduler Attack Tool

ModTask is an advanced C# tool designed for red teaming operations, focusing on manipulating scheduled…

3 hours ago

HellBunny : Advanced Shellcode Loader For EDR Evasio

HellBunny is a malleable shellcode loader written in C and Assembly utilizing direct and indirect…

4 hours ago

SharpRedirect : A Lightweight And Efficient .NET-Based TCP Redirector

SharpRedirect is a simple .NET Framework-based redirector from a specified local port to a destination…

4 hours ago

Flyphish : Mastering Cloud-Based Phishing Simulations For Security Assessments

Flyphish is an Ansible playbook allowing cyber security consultants to deploy a phishing server in…

1 day ago

DeLink : Decrypting D-Link Firmware Across Devices With A Rust-Based Library

A crypto library to decrypt various encrypted D-Link firmware images. Confirmed to work on the…

1 day ago

LLM Lies : Hallucinations Are Not Bugs, But Features As Adversarial Examples

LLMs (e.g., GPT-3.5, LLaMA, and PaLM) suffer from hallucination—fabricating non-existent facts to cheat users without…

1 day ago