0x6rss / telegram-video-extension-manipulation-PoCLinks
Telegram video (mp4) extension manipulation PoC
☆97Updated 8 months ago
Alternatives and similar repositories for telegram-video-extension-manipulation-PoC
Users that are interested in telegram-video-extension-manipulation-PoC are comparing it to the libraries listed below
Sorting:
- Android malware (.apk) can be spread through a fake PDF document by manipulating the file extension in the WhatsApp application. PoC is a…☆187Updated last year
- Exfiltrate sensitive user data from apps on Android 12 and 13 using CVE-2024-0044 vulnerability remotely☆73Updated last year
- Here are +200 different rats some with source code☆126Updated 2 years ago
- Keklick - C2 Hunting, Reporting and Visualization Tool☆63Updated 3 months ago
- This repository contains a few leaked files of HookBot.☆106Updated 2 years ago
- LummaC2 extracted binaries by reversing & LummaC2 Stealer Analysis☆91Updated 9 months ago
- 🔮 Python Remote administration tool via telegram☆54Updated 6 months ago
- A tool that helps you find the real IP addresses hiding behind Cloudflare by checking subdomains.☆115Updated last week
- Generate an undetectable PE ( .exe ), which bypasses windows defender / AV☆126Updated 6 months ago
- Auto exploitation tool for CVE-2024-24401.☆36Updated last year
- 🔑 Open source stealer written in Go, all logs will be sent to Telegram bot.☆128Updated 6 months ago
- Linux-based botnet builder designed for creating advanced botnet payloads.☆100Updated 2 weeks ago
- 🙊 Advanced Rat controllable by a telegram bot with many commands and functions.☆16Updated last year
- CROSS PLATFORM REMOTE ACCESS TROJAN (RAT)☆111Updated 2 months ago
- This tool generates an undetectable Windows reverse shell PowerShell script. Users can configure IP and Port according to their requireme…☆18Updated last year
- ObfuXtreme is an advanced Python obfuscation tool designed to bypass antivirus detection and remain undetectable on VirusTotal.☆181Updated 3 months ago
- Advanced Telegram x Discord C2, great for data Exfitration and Network evasion 🔷☆84Updated 8 months ago
- Note: I am not responsible for any bad act. This is written by Chirag Artani to demonstrate the vulnerability.☆87Updated last year
- SubCortex is a fast and efficient tool for passive subdomain enumeration. It aggregates subdomain data from multiple APIs, helping penetr…☆16Updated 4 months ago
- CryptChat: Beyond Secure Messaging 🛡️☆71Updated 2 years ago
- ☆13Updated 3 weeks ago
- Detection for CVE-2025-61882 & CVE-2025-61884☆36Updated last month
- ☆44Updated this week
- Exploit for CVE-2025-11001 or CVE-2025-11002☆100Updated 2 weeks ago
- A large collection of Troajn☆36Updated 3 years ago
- This repository presents a detailed case study on tracking cryptocurrency transactions and uncovering dark web operations. Using open-sou…☆31Updated 7 months ago
- An easy to install and easy to run tool for generating exploit payloads for CVE-2023-38831, WinRAR RCE before versions 6.23☆116Updated 2 years ago
- Steal/Inject Chrome cookies over the DevTools (--remote-debugging-port) protocol.☆111Updated 2 years ago
- Microsoft Outlook Information Disclosure Vulnerability (leak password hash) - Expect Script POC☆156Updated last year
- Infiltrax is a post-exploitation reconnaissance tool for penetration testers and red teams, designed to capture screenshots, retrieve cli…☆82Updated last year