0x6rss / telegram-video-extension-manipulation-PoC
Telegram video (mp4) extension manipulation PoC
☆79Updated 3 weeks ago
Alternatives and similar repositories for telegram-video-extension-manipulation-PoC:
Users that are interested in telegram-video-extension-manipulation-PoC are comparing it to the libraries listed below
- Android malware (.apk) can be spread through a fake PDF document by manipulating the file extension in the WhatsApp application. PoC is a…☆171Updated 8 months ago
- Exfiltrate sensitive user data from apps on Android 12 and 13 using CVE-2024-0044 vulnerability remotely☆66Updated 8 months ago
- Linux-based botnet builder designed for creating advanced botnet payloads.☆74Updated last month
- Generate an undetectable PE ( .exe ), which bypasses windows defender / AV☆52Updated last week
- Steal/Inject Chrome cookies over the DevTools (--remote-debugging-port) protocol.☆109Updated last year
- Auto exploitation tool for CVE-2024-24401.☆33Updated 6 months ago
- Advanced Telegram x Discord C2, great for data Exfitration and Network evasion 🔷☆74Updated last month
- ☆225Updated 2 months ago
- CROSS PLATFORM REMOTE ACCESS TROJAN (RAT)☆103Updated last year
- POC Pdf-exploit builder on C#☆131Updated last year
- 🔑 Open source stealer written in Go, all logs will be sent to Telegram bot.☆97Updated last week
- Go Based Crypter That Can Bypass Any Kinds Of Antivirus Products, payload crypter supports over 4 programming languages.☆42Updated 9 months ago
- 🙊 Advanced Rat controllable by a telegram bot with many commands and functions.☆14Updated 9 months ago
- PDF dropper Red Team Scenairos☆201Updated 8 months ago
- Simple Powershell Http shell With WEB UI☆70Updated this week
- Shellcode encryptor using a substitution cipher with a randomly generated key.☆120Updated 2 months ago
- This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.☆126Updated 3 weeks ago
- Here are +200 different rats some with source code☆92Updated last year
- GiveWP PHP Object Injection exploit☆56Updated 2 months ago
- cve-2024-42327 ZBX-25623☆33Updated 4 months ago
- Collection of script templates to create infinite UAC prompts forcing a user to run as admin ⚠☆102Updated this week
- VICIdial Unauthenticated SQLi to RCE Exploit (CVE-2024-8503 and CVE-2024-8504)☆39Updated 6 months ago
- LNK-Dropper Builder☆21Updated 6 months ago
- Anti-forensics tool Inspired by NSA's Marble framework.☆9Updated 6 months ago
- Bear C2 is a compilation of C2 scripts, payloads, and stagers used in simulated attacks by Russian APT groups, Bear features a variety of…☆352Updated 6 months ago
- Note: I am not responsible for any bad act. This is written by Chirag Artani to demonstrate the vulnerability.☆87Updated 7 months ago
- Persistent Powershell backdoor tool {😈}☆116Updated 8 months ago
- Injectra is a Python-based tool for injecting custom payloads into various file types using their magic numbers. It supports file types l…☆126Updated 2 months ago
- This repository contains a few leaked files of HookBot.☆104Updated last year
- 🔮 Python Remote administration tool via telegram☆47Updated last year