Android malware (.apk) can be spread through a fake PDF document by manipulating the file extension in the WhatsApp application. PoC is available in this repo
☆190Jul 30, 2024Updated last year
Alternatives and similar repositories for WhatsApp-extension-manipulation-PoC
Users that are interested in WhatsApp-extension-manipulation-PoC are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Telegram video (mp4) extension manipulation PoC☆96Mar 4, 2025Updated last year
- PDF dropper Red Team Scenairos☆229Jul 31, 2024Updated last year
- Analyse MSI files for vulnerabilities☆142Aug 30, 2024Updated last year
- This repository contains PoC for CVE-2024-7965. This is the vulnerability in the V8 that occurs only within ARM64.☆49Sep 16, 2024Updated last year
- ☆38Dec 14, 2024Updated last year
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- BlackHat Asia 2025 code and presentations☆18Apr 13, 2025Updated 11 months ago
- EDR & Antivirus Bypass to Gain Shell Access☆247Sep 30, 2024Updated last year
- GitHub CVE Repository Hunt☆18Jul 23, 2024Updated last year
- CVE-2025-24071: NTLM Hash Leak via RAR/ZIP Extraction and .library-ms File☆398Mar 20, 2025Updated last year
- CVE-2024-0044: a "run-as any app" high-severity vulnerability affecting Android versions 12 and 13☆330Dec 2, 2024Updated last year
- This Python-based GUI application allows you to track the latest security vulnerabilities (CVEs) using the☆40Apr 1, 2025Updated 11 months ago
- Scripts I use to deploy Havoc on Linode and setup categorization and SSL☆41May 31, 2024Updated last year
- Here are +200 different rats some with source code☆155Oct 3, 2023Updated 2 years ago
- Top passwords as per HaveIBeenPwned☆33Mar 12, 2026Updated 2 weeks ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- VICIdial Unauthenticated SQLi to RCE Exploit (CVE-2024-8503 and CVE-2024-8504)☆42Sep 15, 2024Updated last year
- Infiltrax is a post-exploitation reconnaissance tool for penetration testers and red teams, designed to capture screenshots, retrieve cli…☆82Sep 16, 2024Updated last year
- Bear C2 is a compilation of C2 scripts, payloads, and stagers used in simulated attacks by Russian APT groups, Bear features a variety of…☆511Aug 14, 2025Updated 7 months ago
- Short Programs For Spreading Malware☆16Aug 11, 2021Updated 4 years ago
- A modification to fortra's CVE-2023-28252 exploit, compiled to exe☆54Jan 24, 2024Updated 2 years ago
- .NET profiler DLL loading can be abused to make a legit .NET application load a malicious DLL using environment variables. This exploit i…☆47Jul 29, 2024Updated last year
- Matkap - hunt down malicious Telegram bots☆930Aug 11, 2025Updated 7 months ago
- Auto exploitation tool for CVE-2024-24401.☆36Sep 7, 2024Updated last year
- ☆15Apr 17, 2025Updated 11 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Our Tips&Tricks☆148Mar 4, 2026Updated 3 weeks ago
- Hacking Windows through iTunes - Local Privilege Escalation 0-day☆98Oct 4, 2024Updated last year
- ☆20Apr 10, 2025Updated 11 months ago
- A Simple JS code to keylogger data and send it to the personal server☆31Dec 30, 2024Updated last year
- An offensive postexploitation tool that will give you complete control over the Outlook desktop application and therefore to the emails c…☆166Oct 9, 2024Updated last year
- In-Memory Rootkit For Linux and BSD☆87Aug 9, 2025Updated 7 months ago
- exfiltration/infiltration toolkit☆23Dec 20, 2023Updated 2 years ago
- Cisco IOS Security Inspector☆39Dec 29, 2025Updated 3 months ago
- Shellcode encryptor using a substitution cipher with a randomly generated key.☆142Jan 18, 2025Updated last year
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Leak of any user's NetNTLM hash. Fixed in KB5040434☆260Aug 13, 2024Updated last year
- Repo for all my exploits/PoCs☆52May 6, 2025Updated 10 months ago
- A C# Tool to gather information about email breaches☆16Dec 21, 2023Updated 2 years ago
- Cross Platform Telegram based RAT that communicates via telegram to evade network restrictions☆426Sep 17, 2025Updated 6 months ago
- Dump cookies and credentials directly from Chrome/Edge process memory☆1,422Jan 19, 2026Updated 2 months ago
- Nuclei template for CVE-2024-23897 (Jenkins LFI Vulnerability)☆21Feb 5, 2024Updated 2 years ago
- Bypass-Four03 is a powerful bash tool designed to help testers bypass HTTP 403 forbidden errors through various path and header manipulat…☆204May 22, 2025Updated 10 months ago