Matkap - hunt down malicious Telegram bots
☆937Aug 11, 2025Updated 8 months ago
Alternatives and similar repositories for matkap
Users that are interested in matkap are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Android malware (.apk) can be spread through a fake PDF document by manipulating the file extension in the WhatsApp application. PoC is a…☆191Jul 30, 2024Updated last year
- 🧙♂️ Node.js Command & Control for Script-Jacking Vulnerable Electron Applications☆1,320Mar 27, 2026Updated last month
- Keklick - C2 Hunting, Reporting and Visualization Tool☆63Jul 23, 2025Updated 9 months ago
- TeleTracker is a simple set of Python scripts designed for anyone investigating Telegram channels. It helps you send messages quickly and…☆527Jun 15, 2024Updated last year
- Pack/Encrypt/Obfuscate ELF + SHELL scripts☆445Apr 11, 2026Updated 3 weeks ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- All-in-One malware analysis tool.☆1,981Mar 3, 2026Updated last month
- Phishing with a fake reCAPTCHA☆651Sep 13, 2024Updated last year
- Telegram video (mp4) extension manipulation PoC☆96Mar 4, 2025Updated last year
- best tool for finding SQLi,CRLF,XSS,LFi,OpenRedirect☆1,560Dec 7, 2025Updated 4 months ago
- CVE-2025-24071: NTLM Hash Leak via RAR/ZIP Extraction and .library-ms File☆401Mar 20, 2025Updated last year
- ☆16Apr 17, 2025Updated last year
- AdaptixC2 is a highly modular advanced redteam toolkit☆3,033Mar 22, 2026Updated last month
- For educational purposes only, exhaustive samples of 500+ classic/modern trojan builders including screenshots.☆3,847Updated this week
- A secure sandbox environment for malware developers and red teamers to test payloads against detection mechanisms before deployment. Inte…☆1,367Nov 12, 2025Updated 5 months ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Bear C2 is a compilation of C2 scripts, payloads, and stagers used in simulated attacks by Russian APT groups, Bear features a variety of…☆517Aug 14, 2025Updated 8 months ago
- Collection of Cyber Threat Intelligence sources from the deep and dark web☆6,824Updated this week
- Complete list of LPE exploits for Windows (starting from 2023)☆933Apr 24, 2026Updated last week
- The Network Execution Tool☆5,469Apr 24, 2026Updated last week
- Smart keylogging capability to steal SSH Credentials including password & Private Key☆152Mar 26, 2025Updated last year
- Stage 0☆169Dec 18, 2024Updated last year
- how to look for Leaked Credentials !☆1,047May 6, 2024Updated last year
- A repository of credential stealer formats☆253Jun 10, 2025Updated 10 months ago
- Fully functional, from-scratch alternative to the Cobalt Strike Beacon (red teaming tool), offering transparency and flexibility for secu…☆263Mar 13, 2024Updated 2 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- PDF dropper Red Team Scenairos☆229Jul 31, 2024Updated last year
- Chiron Unpacker, developed by the Malwation MTR Team, is an Unpacker for Packers using the Assembly.Load function.☆22Oct 10, 2024Updated last year
- GoResolver is a Go analysis tool using both Go symbol extraction and Control Flow Graph (CFG) similarity to identify and resolve the func…☆112Jan 26, 2026Updated 3 months ago
- Yandex browser password recovery☆11Apr 9, 2025Updated last year
- Because AV evasion should be easy.☆867Nov 28, 2024Updated last year
- bring shodan facets into your terminal without API key.☆100Oct 21, 2025Updated 6 months ago
- jshunter is a command-line tool designed for analyzing JavaScript files and extracting endpoints. This tool specializes in identifying se…☆510Jan 22, 2026Updated 3 months ago
- Injectra is a Python-based tool for injecting custom payloads into various file types using their magic numbers. It supports file types l…☆148Jan 12, 2025Updated last year
- Malware traffic obfuscation library☆38Jul 24, 2025Updated 9 months ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Lena's scripts/code/resources for malware analysis☆26Jun 13, 2024Updated last year
- C2 infrastructure over Microsoft Teams.☆749Jan 15, 2025Updated last year
- Live Feed of C2 servers, tools, and botnets☆771Apr 13, 2026Updated 2 weeks ago
- The Havoc Framework☆8,311Dec 18, 2025Updated 4 months ago
- NucleiScanner is a Powerful Automation tool for detecting Unknown Vulnerabilities in the Web Applications☆344Mar 26, 2025Updated last year
- Extract and execute a PE embedded within a PNG file using an LNK file.☆465Nov 2, 2024Updated last year
- A tool uses Windows Filtering Platform (WFP) to block Endpoint Detection and Response (EDR) agents from reporting security events to the …☆1,859Nov 3, 2024Updated last year