0x6rss / telegram-video-extension-manipulation-PoCView external linksLinks
Telegram video (mp4) extension manipulation PoC
☆96Mar 4, 2025Updated 11 months ago
Alternatives and similar repositories for telegram-video-extension-manipulation-PoC
Users that are interested in telegram-video-extension-manipulation-PoC are comparing it to the libraries listed below
Sorting:
- Android malware (.apk) can be spread through a fake PDF document by manipulating the file extension in the WhatsApp application. PoC is a…☆188Jul 30, 2024Updated last year
- WebSocket and SQL Injection Exploit Script☆40Feb 27, 2025Updated 11 months ago
- ☆41Mar 12, 2025Updated 11 months ago
- Yandex browser passwords and credit-cards decryption algorithm☆22Apr 8, 2025Updated 10 months ago
- This is the latest version of XenoRAT, updated with configurations and capable of bypassing all system securities. It will be maintained …☆22Apr 16, 2025Updated 10 months ago
- CVE-2025-24071: NTLM Hash Leak via RAR/ZIP Extraction and .library-ms File☆395Mar 20, 2025Updated 10 months ago
- CVE-2025-24016: Wazuh Unsafe Deserialization Remote Code Execution (RCE)☆42Feb 19, 2025Updated 11 months ago
- Keycloak admin API allows low privilege users to use administrative functions☆28Oct 12, 2024Updated last year
- My POC implementation of HVNC (Hidden VNC / Hidden Desktop)☆28Dec 30, 2024Updated last year
- ICU-WP is a Flask-based WordPress username enumeration tool. It detects WordPress sites and uses methods like author URL checks, REST API…☆14Jan 17, 2025Updated last year
- mkbootfs binary used in Horizon Kernel Flasher☆10Sep 25, 2021Updated 4 years ago
- SAPLAR - LFI & Path Traversal Scanner☆15Mar 11, 2025Updated 11 months ago
- YARA detection rule for CVE-2024-4367 arbitrary javascript execution in PDF.js☆11May 27, 2024Updated last year
- Some security by obscurity using port-jumping.☆14Aug 21, 2025Updated 5 months ago
- ElfDoor-gcc is an LD_PRELOAD that hijacks gcc to inject malicious code into binaries during linking, without touching the source code.☆132Apr 13, 2025Updated 10 months ago
- Over 50 of The Most Deceptive Phishing Templates, Pages & Links for GoPhish!☆62Jul 9, 2024Updated last year
- Abusing SSRF to deliver an authenticated command injection payload☆30Sep 1, 2025Updated 5 months ago
- Cobalt Strike Beacon Object File to to change the user's desktop wallpaper☆16Sep 15, 2023Updated 2 years ago
- An issue in AVG AVG Anti-Spyware v.7.5 allows an attacker to execute arbitrary code via a crafted script to the guard.exe component☆11Aug 5, 2023Updated 2 years ago
- Ollama AI Analyzer runs directly on your local computer, using Ollama's AI models to analyze your HTTP requests and responses. This means…☆32Mar 1, 2025Updated 11 months ago
- RCE through a race condition in Apache Tomcat☆56Dec 21, 2024Updated last year
- POC of GITHUB simple C2 in rust☆52Jul 27, 2025Updated 6 months ago
- Remote Code Execution via Use-After-Free in JScript.dll (CVE-2025-30397)☆69May 31, 2025Updated 8 months ago
- ☆13Apr 14, 2024Updated last year
- Web Penetration Testing Course Materials☆32May 13, 2024Updated last year
- A simple BOF that disables some logging with NtSetInformationProcess☆13Oct 13, 2023Updated 2 years ago
- SANS Workshop: Active Directory Privilege Escalation with Empire!☆35Nov 12, 2025Updated 3 months ago
- ☆19Nov 26, 2024Updated last year
- A powerful collection of tools designed for social engineering research, penetration testing, and security awareness training. These tool…☆57Jan 25, 2026Updated 3 weeks ago
- CVE-2025-22457: Python Exploit POC Scanner to Detect Ivanti Connect Secure RCE☆19Apr 17, 2025Updated 10 months ago
- Wordlists for content discovery with special words in different languages☆14Jan 17, 2025Updated last year
- Process Hollowing in Rust with Process Executable Relocation Support for both 32 and 64 bit architecture environments.☆22Jan 6, 2025Updated last year
- An injector that use PT_LOAD technique☆12Nov 27, 2022Updated 3 years ago
- CVE-2024-40725 and CVE-2024-40898, affecting Apache HTTP Server versions 2.4.0 through 2.4.61. These flaws pose significant risks to web …☆83Jul 19, 2024Updated last year
- A tool to check microsofts user real endpoint to get data about a tenant.☆16Feb 6, 2025Updated last year
- some sploits☆19Sep 20, 2024Updated last year
- A simple utility to quickly gather historic Port and CVE exposures from an IP range.☆41Nov 12, 2023Updated 2 years ago
- C# tool to identify and exploit weaknesses within MSSQL instances in Active Directory environments☆113Feb 13, 2022Updated 4 years ago
- ☆16Nov 23, 2021Updated 4 years ago