Telegram video (mp4) extension manipulation PoC
☆96Mar 4, 2025Updated last year
Alternatives and similar repositories for telegram-video-extension-manipulation-PoC
Users that are interested in telegram-video-extension-manipulation-PoC are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Android malware (.apk) can be spread through a fake PDF document by manipulating the file extension in the WhatsApp application. PoC is a…☆190Jul 30, 2024Updated last year
- ☆41Mar 12, 2025Updated last year
- WebSocket and SQL Injection Exploit Script☆40Feb 27, 2025Updated last year
- Cobalt Strike Beacon Object File to to change the user's desktop wallpaper☆17Sep 15, 2023Updated 2 years ago
- This is the latest version of XenoRAT, updated with configurations and capable of bypassing all system securities. It will be maintained …☆23Apr 16, 2025Updated 11 months ago
- MB Bank Balance Notifier là một ứng dụng iOS mô phỏng thông báo biến động số dư tài khoản MB Bank. Ứng dụng này giúp bạn kiểm tra và trải…☆13Jul 27, 2024Updated last year
- My POC implementation of HVNC (Hidden VNC / Hidden Desktop)☆28Dec 30, 2024Updated last year
- Yandex browser passwords and credit-cards decryption algorithm☆23Apr 8, 2025Updated 11 months ago
- Tool to obtain hash using MS-SNTP for user accounts☆29Jan 22, 2025Updated last year
- ☆13Apr 14, 2024Updated last year
- ICU-WP is a Flask-based WordPress username enumeration tool. It detects WordPress sites and uses methods like author URL checks, REST API…☆14Jan 17, 2025Updated last year
- ☆55Sep 26, 2024Updated last year
- Over 50 of The Most Deceptive Phishing Templates, Pages & Links for GoPhish!☆66Jul 9, 2024Updated last year
- CVE-2025-24016: Wazuh Unsafe Deserialization Remote Code Execution (RCE)☆42Feb 19, 2025Updated last year
- CVE-2025-24071: NTLM Hash Leak via RAR/ZIP Extraction and .library-ms File☆398Mar 20, 2025Updated last year
- Keycloak admin API allows low privilege users to use administrative functions☆28Oct 12, 2024Updated last year
- SANS Workshop: Active Directory Privilege Escalation with Empire!☆37Nov 12, 2025Updated 4 months ago
- SAPLAR - LFI & Path Traversal Scanner☆15Mar 11, 2025Updated last year
- RCE through a race condition in Apache Tomcat☆57Dec 21, 2024Updated last year
- Abusing SSRF to deliver an authenticated command injection payload☆29Sep 1, 2025Updated 6 months ago
- Download & Execute file using DigiSpark ATtiny85, RubberDucky, Arduino Pro Micro☆18Jan 10, 2025Updated last year
- Invoke-AtomicAssessment is a powerful tool designed to facilitate adversary emulation by leveraging Atomic Red Team.☆47Jan 22, 2025Updated last year
- POC of GITHUB simple C2 in rust☆52Jul 27, 2025Updated 7 months ago
- A simple BOF that disables some logging with NtSetInformationProcess☆14Oct 13, 2023Updated 2 years ago
- A POC of a new “threadless” process injection technique that works by utilizing the concept of DLL Notification Callbacks in local and re…☆32Aug 23, 2023Updated 2 years ago
- Some security by obscurity using port-jumping.☆14Aug 21, 2025Updated 7 months ago
- Wordlists for content discovery with special words in different languages☆15Jan 17, 2025Updated last year
- An XNU kernel race condition bug☆47Jan 30, 2025Updated last year
- CVE-2025-22457: Python Exploit POC Scanner to Detect Ivanti Connect Secure RCE☆19Apr 17, 2025Updated 11 months ago
- IDOR Scanner is a Burp Suite extension that automates the detection and enumeration of potentially vulnerable numeric fields to identify …☆44Feb 24, 2025Updated last year
- ☆12Sep 12, 2020Updated 5 years ago
- PDF dropper Red Team Scenairos☆229Jul 31, 2024Updated last year
- ☆10Jun 2, 2021Updated 4 years ago
- A simple slot machine game that runs in the browser.☆13Mar 27, 2021Updated 4 years ago
- Remote Code Execution via Use-After-Free in JScript.dll (CVE-2025-30397)☆67May 31, 2025Updated 9 months ago
- Ollama AI Analyzer runs directly on your local computer, using Ollama's AI models to analyze your HTTP requests and responses. This means…☆32Mar 1, 2025Updated last year
- ElfDoor-gcc is an LD_PRELOAD that hijacks gcc to inject malicious code into binaries during linking, without touching the source code.☆133Apr 13, 2025Updated 11 months ago
- A powerful collection of tools designed for social engineering research, penetration testing, and security awareness training. These tool…☆59Jan 25, 2026Updated last month
- ☆55May 31, 2025Updated 9 months ago