0x6rss / telegram-video-extension-manipulation-PoCLinks
Telegram video (mp4) extension manipulation PoC
☆89Updated 3 months ago
Alternatives and similar repositories for telegram-video-extension-manipulation-PoC
Users that are interested in telegram-video-extension-manipulation-PoC are comparing it to the libraries listed below
Sorting:
- Android malware (.apk) can be spread through a fake PDF document by manipulating the file extension in the WhatsApp application. PoC is a…☆175Updated 10 months ago
- Exfiltrate sensitive user data from apps on Android 12 and 13 using CVE-2024-0044 vulnerability remotely☆68Updated 10 months ago
- Advanced Python Code Obfuscation Suite with Military-Grade Encryption and Anti-Reverse Engineering Features☆142Updated 2 months ago
- Auto exploitation tool for CVE-2024-24401.☆36Updated 9 months ago
- Linux-based botnet builder designed for creating advanced botnet payloads.☆87Updated last week
- This repository contains a few leaked files of HookBot.☆104Updated last year
- Steal/Inject Chrome cookies over the DevTools (--remote-debugging-port) protocol.☆110Updated 2 years ago
- LummaC2 extracted binaries by reversing & LummaC2 Stealer Analysis☆55Updated 3 months ago
- Note: I am not responsible for any bad act. This is written by Chirag Artani to demonstrate the vulnerability.☆87Updated 9 months ago
- Advanced Telegram x Discord C2, great for data Exfitration and Network evasion 🔷☆75Updated 3 months ago
- CROSS PLATFORM REMOTE ACCESS TROJAN (RAT)☆105Updated last year
- VICIdial Unauthenticated SQLi to RCE Exploit (CVE-2024-8503 and CVE-2024-8504)☆40Updated 8 months ago
- 🦎Triton_RAT is free and easy to use, one of the best remote administration tools written in Python, fully integrated with Telegram🦎☆53Updated last month
- 🔮 Python Remote administration tool via telegram☆49Updated last month
- Here are +200 different rats some with source code☆97Updated last year
- Persistent Powershell backdoor tool {😈}☆119Updated 10 months ago
- SubCortex is a fast and efficient tool for passive subdomain enumeration. It aggregates subdomain data from multiple APIs, helping penetr…☆16Updated 2 months ago
- Shellcode encryptor using a substitution cipher with a randomly generated key.☆129Updated 4 months ago
- ⚡ Scan World FTP Servers and Steal Their Data 🌍☆40Updated 4 months ago
- Yandex browser passwords and credit-cards decryption algorithm☆13Updated last month
- payload Execution by Fake Windows SmartScreen with requires Administrator privileges & Turn off real SmartScreen Filter☆95Updated last year
- Simple Powershell Http shell With WEB UI☆71Updated 2 months ago
- Go Based Crypter That Can Bypass Any Kinds Of Antivirus Products, payload crypter supports over 4 programming languages.☆46Updated last month
- Generate an undetectable PE ( .exe ), which bypasses windows defender / AV☆115Updated 3 weeks ago
- PDF dropper Red Team Scenairos☆208Updated 10 months ago
- You should never use malware to infiltrate a target system. With the skill of writing and exploiting technical codes, you can do the best…☆73Updated last month
- An easy to install and easy to run tool for generating exploit payloads for CVE-2023-38831, WinRAR RCE before versions 6.23☆115Updated last year
- CVE-2023-43261 - Credential Leakage Through Unprotected System Logs and Weak Password Encryption☆58Updated last year
- execute PE in memory Filelessly☆38Updated 3 months ago
- ☆245Updated 4 months ago