Android malware (.apk) can be spread through a fake PDF document by manipulating the file extension in the WhatsApp application. PoC is available in this repo
☆191Jul 30, 2024Updated last year
Alternatives and similar repositories for WhatsApp-extension-manipulation-PoC
Users that are interested in WhatsApp-extension-manipulation-PoC are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Telegram video (mp4) extension manipulation PoC☆96Mar 4, 2025Updated last year
- PDF dropper Red Team Scenairos☆229Jul 31, 2024Updated last year
- Analyse MSI files for vulnerabilities☆143Aug 30, 2024Updated last year
- This repository contains PoC for CVE-2024-7965. This is the vulnerability in the V8 that occurs only within ARM64.☆49Sep 16, 2024Updated last year
- ☆39Dec 14, 2024Updated last year
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- BlackHat Asia 2025 code and presentations☆17Apr 13, 2025Updated last year
- EDR & Antivirus Bypass to Gain Shell Access☆247Sep 30, 2024Updated last year
- GitHub CVE Repository Hunt☆17Jul 23, 2024Updated last year
- CVE-2025-24071: NTLM Hash Leak via RAR/ZIP Extraction and .library-ms File☆402Mar 20, 2025Updated last year
- CVE-2024-0044: a "run-as any app" high-severity vulnerability affecting Android versions 12 and 13☆331Dec 2, 2024Updated last year
- This Python-based GUI application allows you to track the latest security vulnerabilities (CVEs) using the☆40Apr 1, 2025Updated last year
- Scripts I use to deploy Havoc on Linode and setup categorization and SSL☆41May 31, 2024Updated last year
- Top passwords as per HaveIBeenPwned☆34Mar 12, 2026Updated last month
- VICIdial Unauthenticated SQLi to RCE Exploit (CVE-2024-8503 and CVE-2024-8504)☆43Sep 15, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Infiltrax is a post-exploitation reconnaissance tool for penetration testers and red teams, designed to capture screenshots, retrieve cli…☆83Sep 16, 2024Updated last year
- Here are +200 different rats some with source code☆160Oct 3, 2023Updated 2 years ago
- Bear C2 is a compilation of C2 scripts, payloads, and stagers used in simulated attacks by Russian APT groups, Bear features a variety of…☆519Aug 14, 2025Updated 8 months ago
- Short Programs For Spreading Malware☆16Aug 11, 2021Updated 4 years ago
- A modification to fortra's CVE-2023-28252 exploit, compiled to exe☆54Jan 24, 2024Updated 2 years ago
- .NET profiler DLL loading can be abused to make a legit .NET application load a malicious DLL using environment variables. This exploit i…☆47Jul 29, 2024Updated last year
- Matkap - hunt down malicious Telegram bots☆940Aug 11, 2025Updated 8 months ago
- Auto exploitation tool for CVE-2024-24401.☆36Sep 7, 2024Updated last year
- ☆16Apr 17, 2025Updated last year
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Our Tips&Tricks☆150Mar 4, 2026Updated 2 months ago
- Hacking Windows through iTunes - Local Privilege Escalation 0-day☆98Oct 4, 2024Updated last year
- A Simple JS code to keylogger data and send it to the personal server☆31Dec 30, 2024Updated last year
- An offensive postexploitation tool that will give you complete control over the Outlook desktop application and therefore to the emails c…☆166Oct 9, 2024Updated last year
- In-Memory Rootkit For Linux and BSD☆87Aug 9, 2025Updated 9 months ago
- exfiltration/infiltration toolkit☆23Dec 20, 2023Updated 2 years ago
- Cisco IOS Security Inspector☆39Dec 29, 2025Updated 4 months ago
- Shellcode encryptor using a substitution cipher with a randomly generated key.☆140Jan 18, 2025Updated last year
- Leak of any user's NetNTLM hash. Fixed in KB5040434☆261Aug 13, 2024Updated last year
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Repo for all my exploits/PoCs☆52May 6, 2025Updated last year
- A C# Tool to gather information about email breaches☆16Dec 21, 2023Updated 2 years ago
- ☆12Aug 29, 2024Updated last year
- Cross Platform Telegram based RAT that communicates via telegram to evade network restrictions☆434Sep 17, 2025Updated 7 months ago
- Dump cookies and credentials directly from Chrome/Edge process memory☆1,446Apr 9, 2026Updated last month
- Nuclei template for CVE-2024-23897 (Jenkins LFI Vulnerability)☆21Feb 5, 2024Updated 2 years ago
- Wordpress Plugin Canto < 3.0.5 - Remote File Inclusion (RFI) and Remote Code Execution (RCE)☆17Nov 24, 2023Updated 2 years ago