0x6rss / telegram-video-extension-manipulation-PoCLinks
Telegram video (mp4) extension manipulation PoC
☆89Updated 3 months ago
Alternatives and similar repositories for telegram-video-extension-manipulation-PoC
Users that are interested in telegram-video-extension-manipulation-PoC are comparing it to the libraries listed below
Sorting:
- Android malware (.apk) can be spread through a fake PDF document by manipulating the file extension in the WhatsApp application. PoC is a…☆177Updated 10 months ago
- Exfiltrate sensitive user data from apps on Android 12 and 13 using CVE-2024-0044 vulnerability remotely☆69Updated 10 months ago
- Advanced Python Code Obfuscation Suite with Military-Grade Encryption and Anti-Reverse Engineering Features☆146Updated 3 months ago
- Auto exploitation tool for CVE-2024-24401.☆36Updated 9 months ago
- This repository contains a few leaked files of HookBot.☆104Updated last year
- 🙊 Advanced Rat controllable by a telegram bot with many commands and functions.☆16Updated last year
- 🦎Triton_RAT is free and easy to use, one of the best remote administration tools written in Python, fully integrated with Telegram🦎☆54Updated last week
- Steal/Inject Chrome cookies over the DevTools (--remote-debugging-port) protocol.☆110Updated 2 years ago
- PHP CGI Argument Injection (CVE-2024-4577) RCE☆20Updated 10 months ago
- 🔮 Python Remote administration tool via telegram☆52Updated 2 months ago
- Advanced Telegram x Discord C2, great for data Exfitration and Network evasion 🔷☆76Updated 4 months ago
- Here are +200 different rats some with source code☆100Updated last year
- Linux-based botnet builder designed for creating advanced botnet payloads.☆93Updated last month
- Africana Framework is an open-source, community-driven cybersecurity toolkit designed for ethical penetration testing & vulnerability ass…☆37Updated this week
- 🔑 Open source stealer written in Go, all logs will be sent to Telegram bot.☆113Updated 2 months ago
- CROSS PLATFORM REMOTE ACCESS TROJAN (RAT)☆107Updated last year
- Note: I am not responsible for any bad act. This is written by Chirag Artani to demonstrate the vulnerability.☆86Updated 9 months ago
- This repository presents a detailed case study on tracking cryptocurrency transactions and uncovering dark web operations. Using open-sou…☆25Updated 2 months ago
- PDF dropper Red Team Scenairos☆212Updated 10 months ago
- VICIdial Unauthenticated SQLi to RCE Exploit (CVE-2024-8503 and CVE-2024-8504)☆40Updated 9 months ago
- Generate an undetectable PE ( .exe ), which bypasses windows defender / AV☆118Updated last month
- Anti-forensics tool Inspired by NSA's Marble framework.☆9Updated 2 months ago
- LummaC2 extracted binaries by reversing & LummaC2 Stealer Analysis☆62Updated 4 months ago
- Abusing VirusTotal API to host our C2 traffic, usefull for bypassing blocking firewall rules if VirusTotal is in the target white list , …☆27Updated 2 years ago
- cve-2024-42327 ZBX-25623☆34Updated 6 months ago
- Free and open source information stealer written in Go☆33Updated 6 months ago
- GiveWP PHP Object Injection exploit☆57Updated 5 months ago
- ProxyChecker Made in NodeJS☆37Updated 3 years ago
- Persistent Powershell backdoor tool {😈}☆119Updated 10 months ago
- An easy to install and easy to run tool for generating exploit payloads for CVE-2023-38831, WinRAR RCE before versions 6.23☆115Updated last year