Android malware (.apk) can be spread through a fake PDF document by manipulating the file extension in the WhatsApp application. PoC is available in this repo
☆192Jul 30, 2024Updated last year
Alternatives and similar repositories for WhatsApp-extension-manipulation-PoC
Users that are interested in WhatsApp-extension-manipulation-PoC are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Telegram video (mp4) extension manipulation PoC☆96Mar 4, 2025Updated last year
- PDF dropper Red Team Scenairos☆231Jul 31, 2024Updated last year
- Analyse MSI files for vulnerabilities☆143Aug 30, 2024Updated last year
- This repository contains PoC for CVE-2024-7965. This is the vulnerability in the V8 that occurs only within ARM64.☆49Sep 16, 2024Updated last year
- ☆38Dec 14, 2024Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- BlackHat Asia 2025 code and presentations☆17Apr 13, 2025Updated last year
- EDR & Antivirus Bypass to Gain Shell Access☆247Sep 30, 2024Updated last year
- GitHub CVE Repository Hunt☆17Jul 23, 2024Updated last year
- CVE-2025-24071: NTLM Hash Leak via RAR/ZIP Extraction and .library-ms File☆403Mar 20, 2025Updated last year
- CVE-2024-0044: a "run-as any app" high-severity vulnerability affecting Android versions 12 and 13☆330Dec 2, 2024Updated last year
- This Python-based GUI application allows you to track the latest security vulnerabilities (CVEs) using the☆40Apr 1, 2025Updated last year
- Scripts I use to deploy Havoc on Linode and setup categorization and SSL☆40May 31, 2024Updated last year
- Here are +200 different rats some with source code☆156Oct 3, 2023Updated 2 years ago
- Top passwords as per HaveIBeenPwned☆34Mar 12, 2026Updated last month
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- VICIdial Unauthenticated SQLi to RCE Exploit (CVE-2024-8503 and CVE-2024-8504)☆43Sep 15, 2024Updated last year
- Infiltrax is a post-exploitation reconnaissance tool for penetration testers and red teams, designed to capture screenshots, retrieve cli…☆82Sep 16, 2024Updated last year
- Bear C2 is a compilation of C2 scripts, payloads, and stagers used in simulated attacks by Russian APT groups, Bear features a variety of…☆512Aug 14, 2025Updated 8 months ago
- Short Programs For Spreading Malware☆16Aug 11, 2021Updated 4 years ago
- A modification to fortra's CVE-2023-28252 exploit, compiled to exe☆54Jan 24, 2024Updated 2 years ago
- .NET profiler DLL loading can be abused to make a legit .NET application load a malicious DLL using environment variables. This exploit i…☆47Jul 29, 2024Updated last year
- Auto exploitation tool for CVE-2024-24401.☆36Sep 7, 2024Updated last year
- ☆15Apr 17, 2025Updated last year
- Our Tips&Tricks☆149Mar 4, 2026Updated last month
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Hacking Windows through iTunes - Local Privilege Escalation 0-day☆98Oct 4, 2024Updated last year
- ☆20Apr 10, 2025Updated last year
- A Simple JS code to keylogger data and send it to the personal server☆31Dec 30, 2024Updated last year
- An offensive postexploitation tool that will give you complete control over the Outlook desktop application and therefore to the emails c…☆166Oct 9, 2024Updated last year
- In-Memory Rootkit For Linux and BSD☆87Aug 9, 2025Updated 8 months ago
- exfiltration/infiltration toolkit☆23Dec 20, 2023Updated 2 years ago
- Cisco IOS Security Inspector☆39Dec 29, 2025Updated 3 months ago
- Shellcode encryptor using a substitution cipher with a randomly generated key.☆141Jan 18, 2025Updated last year
- Leak of any user's NetNTLM hash. Fixed in KB5040434☆260Aug 13, 2024Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Repo for all my exploits/PoCs☆52May 6, 2025Updated 11 months ago
- A C# Tool to gather information about email breaches☆16Dec 21, 2023Updated 2 years ago
- ☆12Aug 29, 2024Updated last year
- Cross Platform Telegram based RAT that communicates via telegram to evade network restrictions☆430Sep 17, 2025Updated 7 months ago
- Dump cookies and credentials directly from Chrome/Edge process memory☆1,433Apr 9, 2026Updated last week
- Nuclei template for CVE-2024-23897 (Jenkins LFI Vulnerability)☆21Feb 5, 2024Updated 2 years ago
- Wordpress Plugin Canto < 3.0.5 - Remote File Inclusion (RFI) and Remote Code Execution (RCE)☆17Nov 24, 2023Updated 2 years ago