0x6rss / WhatsApp-extension-manipulation-PoCView external linksLinks
Android malware (.apk) can be spread through a fake PDF document by manipulating the file extension in the WhatsApp application. PoC is available in this repo
☆188Jul 30, 2024Updated last year
Alternatives and similar repositories for WhatsApp-extension-manipulation-PoC
Users that are interested in WhatsApp-extension-manipulation-PoC are comparing it to the libraries listed below
Sorting:
- Telegram video (mp4) extension manipulation PoC☆96Mar 4, 2025Updated 11 months ago
- PDF dropper Red Team Scenairos☆227Jul 31, 2024Updated last year
- Analyse MSI files for vulnerabilities☆143Aug 30, 2024Updated last year
- Wordpress Plugin Canto < 3.0.5 - Remote File Inclusion (RFI) and Remote Code Execution (RCE)☆15Nov 24, 2023Updated 2 years ago
- ☆38Dec 14, 2024Updated last year
- Top 400 passwords as per HaveIBeenPwned☆22Oct 14, 2024Updated last year
- Auto exploitation tool for CVE-2024-24401.☆36Sep 7, 2024Updated last year
- This Python-based GUI application allows you to track the latest security vulnerabilities (CVEs) using the☆41Apr 1, 2025Updated 10 months ago
- BlackHat Asia 2025 code and presentations☆18Apr 13, 2025Updated 10 months ago
- EDR & Antivirus Bypass to Gain Shell Access☆246Sep 30, 2024Updated last year
- Bypass-Four03 is a powerful bash tool designed to help testers bypass HTTP 403 forbidden errors through various path and header manipulat…☆164May 22, 2025Updated 8 months ago
- Infiltrax is a post-exploitation reconnaissance tool for penetration testers and red teams, designed to capture screenshots, retrieve cli…☆82Sep 16, 2024Updated last year
- This repository contains PoC for CVE-2024-7965. This is the vulnerability in the V8 that occurs only within ARM64.☆48Sep 16, 2024Updated last year
- A C# Tool to gather information about email breaches☆16Dec 21, 2023Updated 2 years ago
- Here are +200 different rats some with source code☆150Oct 3, 2023Updated 2 years ago
- This is the ringzer0 writeup of web exploitation catagery. The name is "Word mean something"☆14Dec 8, 2023Updated 2 years ago
- Shellcode encryptor using a substitution cipher with a randomly generated key.☆141Jan 18, 2025Updated last year
- Repo for all my exploits/PoCs☆52May 6, 2025Updated 9 months ago
- Atlassian Companion RCE Vulnerability Proof of Concept☆25Dec 15, 2023Updated 2 years ago
- GitHub CVE Repository Hunt☆18Jul 23, 2024Updated last year
- CVE-2024-32640 | Automated SQLi Exploitation PoC☆77May 16, 2024Updated last year
- A Simple JS code to keylogger data and send it to the personal server☆31Dec 30, 2024Updated last year
- Bear C2 is a compilation of C2 scripts, payloads, and stagers used in simulated attacks by Russian APT groups, Bear features a variety of…☆508Aug 14, 2025Updated 6 months ago
- In-Memory Rootkit For Linux and BSD☆87Aug 9, 2025Updated 6 months ago
- Leak of any user's NetNTLM hash. Fixed in KB5040434☆259Aug 13, 2024Updated last year
- ✉️ HTML Smuggling generator&obfuscator for your Red Team operations☆175Feb 27, 2024Updated last year
- ☆567Mar 28, 2024Updated last year
- PacketSpy☆157May 31, 2024Updated last year
- C++ Staged Shellcode Loader with Evasion capabilities.☆95Oct 7, 2024Updated last year
- Docker Remote API Scanner and Exploit☆180Nov 13, 2023Updated 2 years ago
- Our Tips&Tricks☆128Feb 17, 2025Updated last year
- A modification to fortra's CVE-2023-28252 exploit, compiled to exe☆54Jan 24, 2024Updated 2 years ago
- Hacking Windows through iTunes - Local Privilege Escalation 0-day☆98Oct 4, 2024Updated last year
- ☆44Apr 27, 2024Updated last year
- exfiltration/infiltration toolkit☆23Dec 20, 2023Updated 2 years ago
- This tool will check for Sensitive Data Leakage with some useful patterns/RegEx. The patterns are mostly targeted on waybackdata and filt…☆229May 20, 2025Updated 8 months ago
- CVE-2025-24071: NTLM Hash Leak via RAR/ZIP Extraction and .library-ms File☆395Mar 20, 2025Updated 10 months ago
- ☆21Nov 6, 2024Updated last year
- An offensive postexploitation tool that will give you complete control over the Outlook desktop application and therefore to the emails c…☆166Oct 9, 2024Updated last year