Matkap - hunt down malicious Telegram bots
☆930Aug 11, 2025Updated 7 months ago
Alternatives and similar repositories for matkap
Users that are interested in matkap are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Android malware (.apk) can be spread through a fake PDF document by manipulating the file extension in the WhatsApp application. PoC is a…☆190Jul 30, 2024Updated last year
- 🧙♂️ Node.js Command & Control for Script-Jacking Vulnerable Electron Applications☆1,307Updated this week
- Keklick - C2 Hunting, Reporting and Visualization Tool☆62Jul 23, 2025Updated 8 months ago
- TeleTracker is a simple set of Python scripts designed for anyone investigating Telegram channels. It helps you send messages quickly and…☆526Jun 15, 2024Updated last year
- Pack/Encrypt/Obfuscate ELF + SHELL scripts☆440Dec 9, 2025Updated 3 months ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- All-in-One malware analysis tool.☆1,968Mar 3, 2026Updated 3 weeks ago
- Phishing with a fake reCAPTCHA☆647Sep 13, 2024Updated last year
- best tool for finding SQLi,CRLF,XSS,LFi,OpenRedirect☆1,541Dec 7, 2025Updated 3 months ago
- Telegram video (mp4) extension manipulation PoC☆96Mar 4, 2025Updated last year
- AdaptixC2 is a highly modular advanced redteam toolkit☆2,866Mar 22, 2026Updated last week
- CVE-2025-24071: NTLM Hash Leak via RAR/ZIP Extraction and .library-ms File☆398Mar 20, 2025Updated last year
- ☆15Apr 17, 2025Updated 11 months ago
- For educational purposes only, exhaustive samples of 500+ classic/modern trojan builders including screenshots.☆3,691Mar 22, 2026Updated last week
- A secure sandbox environment for malware developers and red teamers to test payloads against detection mechanisms before deployment. Inte…☆1,334Nov 12, 2025Updated 4 months ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Bear C2 is a compilation of C2 scripts, payloads, and stagers used in simulated attacks by Russian APT groups, Bear features a variety of…☆511Aug 14, 2025Updated 7 months ago
- Collection of Cyber Threat Intelligence sources from the deep and dark web☆6,732Updated this week
- Complete list of LPE exploits for Windows (starting from 2023)☆917Mar 13, 2026Updated 2 weeks ago
- The Network Execution Tool☆5,377Updated this week
- Smart keylogging capability to steal SSH Credentials including password & Private Key☆152Mar 26, 2025Updated last year
- Stage 0☆169Dec 18, 2024Updated last year
- how to look for Leaked Credentials !☆1,035May 6, 2024Updated last year
- A repository of credential stealer formats☆252Jun 10, 2025Updated 9 months ago
- Fully functional, from-scratch alternative to the Cobalt Strike Beacon (red teaming tool), offering transparency and flexibility for secu…☆262Mar 13, 2024Updated 2 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- PDF dropper Red Team Scenairos☆229Jul 31, 2024Updated last year
- Chiron Unpacker, developed by the Malwation MTR Team, is an Unpacker for Packers using the Assembly.Load function.☆22Oct 10, 2024Updated last year
- GoResolver is a Go analysis tool using both Go symbol extraction and Control Flow Graph (CFG) similarity to identify and resolve the func…☆108Jan 26, 2026Updated 2 months ago
- Yandex browser password recovery☆11Apr 9, 2025Updated 11 months ago
- Because AV evasion should be easy.☆860Nov 28, 2024Updated last year
- bring shodan facets into your terminal without API key.☆97Oct 21, 2025Updated 5 months ago
- jshunter is a command-line tool designed for analyzing JavaScript files and extracting endpoints. This tool specializes in identifying se…☆497Jan 22, 2026Updated 2 months ago
- Injectra is a Python-based tool for injecting custom payloads into various file types using their magic numbers. It supports file types l…☆147Jan 12, 2025Updated last year
- Malware traffic obfuscation library☆38Jul 24, 2025Updated 8 months ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Lena's scripts/code/resources for malware analysis☆26Jun 13, 2024Updated last year
- C2 infrastructure over Microsoft Teams.☆747Jan 15, 2025Updated last year
- Creating a Fake WhatsApp Message via SQLite: Understanding the Logic Behind the Manipulation☆38Jul 28, 2025Updated 8 months ago
- Live Feed of C2 servers, tools, and botnets☆760Updated this week
- The Havoc Framework☆8,256Dec 18, 2025Updated 3 months ago
- NucleiScanner is a Powerful Automation tool for detecting Unknown Vulnerabilities in the Web Applications☆341Mar 26, 2025Updated last year
- Morpheus is an lsass stealer that extracts lsass.exe in RAM and exfiltrates it via forged and crypted NTP packets. For authorized testin…☆165Jun 19, 2025Updated 9 months ago