0x6rss / telegram-video-extension-manipulation-PoCLinks
Telegram video (mp4) extension manipulation PoC
☆95Updated 6 months ago
Alternatives and similar repositories for telegram-video-extension-manipulation-PoC
Users that are interested in telegram-video-extension-manipulation-PoC are comparing it to the libraries listed below
Sorting:
- Android malware (.apk) can be spread through a fake PDF document by manipulating the file extension in the WhatsApp application. PoC is a…☆184Updated last year
- Exfiltrate sensitive user data from apps on Android 12 and 13 using CVE-2024-0044 vulnerability remotely☆72Updated last year
- ObfuXtreme is an advanced Python obfuscation tool designed to bypass antivirus detection and remain undetectable on VirusTotal.☆167Updated last month
- This repository contains a few leaked files of HookBot.☆104Updated 2 years ago
- LummaC2 extracted binaries by reversing & LummaC2 Stealer Analysis☆82Updated 7 months ago
- Here are +200 different rats some with source code☆117Updated last year
- Note: I am not responsible for any bad act. This is written by Chirag Artani to demonstrate the vulnerability.☆86Updated last year
- 🔑 Open source stealer written in Go, all logs will be sent to Telegram bot.☆121Updated 4 months ago
- 🔮 Python Remote administration tool via telegram☆51Updated 4 months ago
- CROSS PLATFORM REMOTE ACCESS TROJAN (RAT)☆109Updated this week
- Auto exploitation tool for CVE-2024-24401.☆35Updated last year
- ZTrace 11 is Continuation of the zerotrace.☆23Updated 3 months ago
- Keklick - C2 Hunting, Reporting and Visualization Tool☆62Updated last month
- Hacking Hotspots: Pre-Auth Remote Code Execution, Arbitrary SMS & Adjacent Attacks on 5G & 4G/LTE Routers☆84Updated last week
- Generate an undetectable PE ( .exe ), which bypasses windows defender / AV☆121Updated 4 months ago
- Embed a payload inside a PNG file☆347Updated 10 months ago
- PDF dropper Red Team Scenairos☆221Updated last year
- Africana Framework is an open-source, community-driven cybersecurity toolkit designed for ethical penetration testing & vulnerability ass…☆40Updated this week
- This tool generates an undetectable Windows reverse shell PowerShell script. Users can configure IP and Port according to their requireme…☆16Updated last year
- Steal/Inject Chrome cookies over the DevTools (--remote-debugging-port) protocol.☆110Updated 2 years ago
- 🙊 Advanced Rat controllable by a telegram bot with many commands and functions.☆16Updated last year
- A large collection of Troajn☆34Updated 3 years ago
- You should never use malware to infiltrate a target system. With the skill of writing and exploiting technical codes, you can do the best…☆85Updated 4 months ago
- Go Based Crypter That Can Bypass Any Kinds Of Antivirus Products, payload crypter supports over 4 programming languages.☆52Updated 4 months ago
- Linux-based botnet builder designed for creating advanced botnet payloads.☆100Updated 3 months ago
- BrowserSnatch is a powerful browser stealer or browser data extraction tool intended to be used for ethical hacking or penetration testin…☆272Updated 5 months ago
- Shellcode encryptor using a substitution cipher with a randomly generated key.☆140Updated 8 months ago
- Polymorphic Command & Control☆92Updated 6 months ago
- Infiltrax is a post-exploitation reconnaissance tool for penetration testers and red teams, designed to capture screenshots, retrieve cli…☆79Updated last year
- execute PE in memory Filelessly☆45Updated 7 months ago