0x6rss / telegram-video-extension-manipulation-PoC
Telegram video (mp4) extension manipulation PoC
☆88Updated 2 months ago
Alternatives and similar repositories for telegram-video-extension-manipulation-PoC
Users that are interested in telegram-video-extension-manipulation-PoC are comparing it to the libraries listed below
Sorting:
- Android malware (.apk) can be spread through a fake PDF document by manipulating the file extension in the WhatsApp application. PoC is a…☆174Updated 9 months ago
- Exfiltrate sensitive user data from apps on Android 12 and 13 using CVE-2024-0044 vulnerability remotely☆66Updated 9 months ago
- Advanced Python Code Obfuscation Suite with Military-Grade Encryption and Anti-Reverse Engineering Features☆128Updated last month
- Steal/Inject Chrome cookies over the DevTools (--remote-debugging-port) protocol.☆109Updated last year
- This repository contains a few leaked files of HookBot.☆104Updated last year
- Advanced Telegram x Discord C2, great for data Exfitration and Network evasion 🔷☆75Updated 2 months ago
- Auto exploitation tool for CVE-2024-24401.☆34Updated 8 months ago
- Note: I am not responsible for any bad act. This is written by Chirag Artani to demonstrate the vulnerability.☆87Updated 8 months ago
- CROSS PLATFORM REMOTE ACCESS TROJAN (RAT)☆105Updated last year
- Linux-based botnet builder designed for creating advanced botnet payloads.☆85Updated last month
- LummaC2 extracted binaries by reversing & LummaC2 Stealer Analysis☆40Updated 2 months ago
- cve-2024-42327 ZBX-25623☆33Updated 5 months ago
- POC Pdf-exploit builder on C#☆135Updated last year
- Smart keylogging capability to steal SSH Credentials including password & Private Key☆134Updated last month
- GiveWP PHP Object Injection exploit☆57Updated 4 months ago
- VICIdial Unauthenticated SQLi to RCE Exploit (CVE-2024-8503 and CVE-2024-8504)☆39Updated 8 months ago
- Microsoft Outlook Information Disclosure Vulnerability (leak password hash) - Expect Script POC☆153Updated last year
- LNK-Dropper Builder☆22Updated last month
- Here are +200 different rats some with source code☆95Updated last year
- "Collection of IoT vulnerability research and exploits, focusing on unauthorized access, CVEs, and popular devices like TP-LINK, Tenda, D…☆11Updated 3 months ago
- ☆242Updated 4 months ago
- Africana Framework is an open-source, community-driven cybersecurity toolkit designed for ethical penetration testing & vulnerability ass…☆33Updated last week
- Remote Unauthenticated Code Execution Vulnerability in OpenSSH server (CVE-2024-6387)☆107Updated 8 months ago
- 🙊 Advanced Rat controllable by a telegram bot with many commands and functions.☆15Updated 10 months ago
- payload Execution by Fake Windows SmartScreen with requires Administrator privileges & Turn off real SmartScreen Filter☆95Updated last year
- 🔬Collection of malware, ransomware, RATs, botnets, stealers, etc.☆159Updated 3 years ago
- SubCortex is a fast and efficient tool for passive subdomain enumeration. It aggregates subdomain data from multiple APIs, helping penetr…☆16Updated last month
- This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.☆131Updated 2 months ago
- 🔮 Python Remote administration tool via telegram☆49Updated 3 weeks ago
- CVE-2024-38077: Remote Code Execution Vulnerability in Windows Remote Desktop Licensing Service☆12Updated 7 months ago