0x6rss / telegram-video-extension-manipulation-PoCLinks
Telegram video (mp4) extension manipulation PoC
☆93Updated 4 months ago
Alternatives and similar repositories for telegram-video-extension-manipulation-PoC
Users that are interested in telegram-video-extension-manipulation-PoC are comparing it to the libraries listed below
Sorting:
- Android malware (.apk) can be spread through a fake PDF document by manipulating the file extension in the WhatsApp application. PoC is a…☆184Updated 11 months ago
- Exfiltrate sensitive user data from apps on Android 12 and 13 using CVE-2024-0044 vulnerability remotely☆70Updated 11 months ago
- Here are +200 different rats some with source code☆103Updated last year
- Auto exploitation tool for CVE-2024-24401.☆36Updated 10 months ago
- 🔑 Open source stealer written in Go, all logs will be sent to Telegram bot.☆116Updated 2 months ago
- This repository contains a few leaked files of HookBot.☆104Updated last year
- Generate an undetectable PE ( .exe ), which bypasses windows defender / AV☆122Updated 2 months ago
- Advanced Python Code Obfuscation Suite with Military-Grade Encryption and Anti-Reverse Engineering Features☆151Updated 3 months ago
- You should never use malware to infiltrate a target system. With the skill of writing and exploiting technical codes, you can do the best…☆80Updated 2 months ago
- Note: I am not responsible for any bad act. This is written by Chirag Artani to demonstrate the vulnerability.☆86Updated 10 months ago
- Steal/Inject Chrome cookies over the DevTools (--remote-debugging-port) protocol.☆109Updated 2 years ago
- Advanced Telegram x Discord C2, great for data Exfitration and Network evasion 🔷☆77Updated 4 months ago
- CROSS PLATFORM REMOTE ACCESS TROJAN (RAT)☆108Updated last year
- CryptChat: Beyond Secure Messaging 🛡️☆70Updated last year
- 🙊 Advanced Rat controllable by a telegram bot with many commands and functions.☆16Updated last year
- 🔮 Python Remote administration tool via telegram☆52Updated 2 months ago
- A large collection of Troajn☆34Updated 2 years ago
- Linux-based botnet builder designed for creating advanced botnet payloads.☆96Updated last month
- LummaC2 extracted binaries by reversing & LummaC2 Stealer Analysis☆70Updated 5 months ago
- HikvisionExploiter is a Python-based utility designed to automate exploitation and directory accessibility checks on Hikvision network ca…☆88Updated 2 months ago
- Scripts to set up your own Android 📱 app hacking lab☆88Updated last year
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆65Updated last year
- Fetching passwords from the chrome browser database☆91Updated last year
- PDF dropper Red Team Scenairos☆213Updated 11 months ago
- ModTracer Finds Hidden Linux Kernel Rootkits and then make visible again.☆83Updated 4 months ago
- The tool that bypasses the firewall's Application Based Rules and lets you connect to anywhere, ANY IP, ANY PORT and ANY APPLICATION.☆62Updated 10 months ago
- Persistent Powershell backdoor tool {😈}☆119Updated 11 months ago
- Infiltrax is a post-exploitation reconnaissance tool for penetration testers and red teams, designed to capture screenshots, retrieve cli…☆78Updated 10 months ago
- POC | Steal user WhatsApp information/data☆68Updated 2 months ago
- Microsoft Outlook Information Disclosure Vulnerability (leak password hash) - Expect Script POC☆154Updated last year