Telegram video (mp4) extension manipulation PoC
☆96Mar 4, 2025Updated last year
Alternatives and similar repositories for telegram-video-extension-manipulation-PoC
Users that are interested in telegram-video-extension-manipulation-PoC are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Android malware (.apk) can be spread through a fake PDF document by manipulating the file extension in the WhatsApp application. PoC is a…☆192Jul 30, 2024Updated last year
- ☆42Mar 12, 2025Updated last year
- WebSocket and SQL Injection Exploit Script☆41Feb 27, 2025Updated last year
- Cobalt Strike Beacon Object File to to change the user's desktop wallpaper☆17Sep 15, 2023Updated 2 years ago
- This is the latest version of XenoRAT, updated with configurations and capable of bypassing all system securities. It will be maintained …☆23Apr 16, 2025Updated 11 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- MB Bank Balance Notifier là một ứng dụng iOS mô phỏng thông báo biến động số dư tài khoản MB Bank. Ứng dụng này giúp bạn kiểm tra và trải…☆13Jul 27, 2024Updated last year
- Yandex browser passwords and credit-cards decryption algorithm☆24Apr 8, 2025Updated last year
- Anti-forensics tool Inspired by NSA's Marble framework.☆10Apr 17, 2025Updated 11 months ago
- ICU-WP is a Flask-based WordPress username enumeration tool. It detects WordPress sites and uses methods like author URL checks, REST API…☆15Jan 17, 2025Updated last year
- Tool to obtain hash using MS-SNTP for user accounts☆30Jan 22, 2025Updated last year
- Over 50 of The Most Deceptive Phishing Templates, Pages & Links for GoPhish!☆67Jul 9, 2024Updated last year
- CVE-2025-24016: Wazuh Unsafe Deserialization Remote Code Execution (RCE)☆42Feb 19, 2025Updated last year
- CVE-2025-24071: NTLM Hash Leak via RAR/ZIP Extraction and .library-ms File☆403Mar 20, 2025Updated last year
- Keycloak admin API allows low privilege users to use administrative functions☆29Oct 12, 2024Updated last year
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- SANS Workshop: Active Directory Privilege Escalation with Empire!☆37Nov 12, 2025Updated 5 months ago
- SAPLAR - LFI & Path Traversal Scanner☆15Mar 11, 2025Updated last year
- RCE through a race condition in Apache Tomcat☆57Dec 21, 2024Updated last year
- Abusing SSRF to deliver an authenticated command injection payload☆29Sep 1, 2025Updated 7 months ago
- Download & Execute file using DigiSpark ATtiny85, RubberDucky, Arduino Pro Micro☆20Jan 10, 2025Updated last year
- Invoke-AtomicAssessment is a powerful tool designed to facilitate adversary emulation by leveraging Atomic Red Team.☆47Jan 22, 2025Updated last year
- POC of GITHUB simple C2 in rust☆54Jul 27, 2025Updated 8 months ago
- LSTAR - CobaltStrike Translated to EN☆22Jun 15, 2023Updated 2 years ago
- A POC of a new “threadless” process injection technique that works by utilizing the concept of DLL Notification Callbacks in local and re…☆32Aug 23, 2023Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Creating a sliding card wallet layout for Android.☆11Oct 27, 2021Updated 4 years ago
- Some security by obscurity using port-jumping.☆14Aug 21, 2025Updated 7 months ago
- Wordlists for content discovery with special words in different languages☆15Jan 17, 2025Updated last year
- An XNU kernel race condition bug☆48Jan 30, 2025Updated last year
- CVE-2025-22457: Python Exploit POC Scanner to Detect Ivanti Connect Secure RCE☆19Apr 17, 2025Updated 11 months ago
- ☆18May 3, 2024Updated last year
- IDOR Scanner is a Burp Suite extension that automates the detection and enumeration of potentially vulnerable numeric fields to identify …☆44Feb 24, 2025Updated last year
- ☆12Sep 12, 2020Updated 5 years ago
- PDF dropper Red Team Scenairos☆231Jul 31, 2024Updated last year
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆10Jun 2, 2021Updated 4 years ago
- A simple slot machine game that runs in the browser.☆13Mar 27, 2021Updated 5 years ago
- Remote Code Execution via Use-After-Free in JScript.dll (CVE-2025-30397)☆66May 31, 2025Updated 10 months ago
- Ollama AI Analyzer runs directly on your local computer, using Ollama's AI models to analyze your HTTP requests and responses. This means…☆32Mar 1, 2025Updated last year
- ElfDoor-gcc is an LD_PRELOAD that hijacks gcc to inject malicious code into binaries during linking, without touching the source code.☆133Apr 13, 2025Updated 11 months ago
- ☆12Apr 20, 2025Updated 11 months ago
- A powerful collection of tools designed for social engineering research, penetration testing, and security awareness training. These tool…☆60Jan 25, 2026Updated 2 months ago