0x6rss / whatsapp-message-manipulationLinks
Creating a Fake WhatsApp Message via SQLite: Understanding the Logic Behind the Manipulation
☆36Updated 5 months ago
Alternatives and similar repositories for whatsapp-message-manipulation
Users that are interested in whatsapp-message-manipulation are comparing it to the libraries listed below
Sorting:
- ☆166Updated 3 weeks ago
- automated Open Source Intelligence gathering☆182Updated last month
- EVA is an AI-assisted penetration testing agent that enhances offensive security workflows by providing structured attack guidance, conte…☆265Updated last week
- A powerful collection of tools designed for social engineering research, penetration testing, and security awareness training. These tool…☆56Updated 9 months ago
- evilwaf is a penetration testing tool designed to detect and bypass common Web Application Firewalls (WAFs).☆298Updated last month
- ZeroTrace is a powerful ethical hacking tool for anonymization, routing all your system network traffic through the Tor network, making i…☆154Updated last month
- JWT Auditor – Analyze, break, and understand your tokens like a pro.☆456Updated 3 weeks ago
- API Pentesting Tools are specialized security tools used to test and analyze the security of Application Programming Interfaces (APIs).☆227Updated 9 months ago
- Analyze Android native `.so` files☆119Updated 5 months ago
- 🤖 LLM-powered agent for automated Google Dorking in bug hunting & pentesting.☆210Updated last month
- ShodanSpider is an open-source tool for interacting with Shodan. It lets you search and extract data from Shodan without an API key, offe…☆168Updated 9 months ago
- Tyrant is a malicious tool used for penetration testing and remote control persistence.☆36Updated 11 months ago
- Chrome Extensions for OSINT☆159Updated 2 months ago
- FIRST ever tool to view "private Instagram accounts" (download medias without login)☆487Updated 2 weeks ago
- A python-based vulnerability scanner designed to identify open redirect flaws in website applications.☆18Updated 8 months ago
- Pen Hunter is a comprehensive vulnerability scanning tool designed for penetration testers, security researchers and bug bounties. it aut…☆21Updated last year
- This tool can retrieve : 1.Deleted tweets and replies ,Even if The account is suspended 2 .Old bios and Timestamp of The tweets☆257Updated last year
- A user-friendly Python toolkit for open source intelligence, providing key features such as image geolocation, social media profiling, em…☆206Updated 4 months ago
- Prompts for performing tests on your Kali Linux using Gemini-cli, ChatGPT, DeepSeek, CursorAI, Claude Code, and Copilot.☆187Updated 3 weeks ago
- ☆169Updated last week
- ☆223Updated 2 months ago
- GoogleDorker - Unleash the power of Google dorking for ethical hackers with custom search precision.☆258Updated last year
- Lightning-fast passive subdomain discovery tool for security professionals and bug bounty hunters.☆401Updated 3 weeks ago
- ☆138Updated last month
- CLI tool that fetches resolved & disclosed HackerOne reports by vulnerability and exports them to CSV.☆34Updated 3 months ago
- Automated red-team toolkit for stress-testing LLM defences - Vector Attacks on LLMs (Gendalf Case Study)☆108Updated 5 months ago
- A tool that helps you find the real IP addresses hiding behind Cloudflare by checking subdomains.☆276Updated last month
- ☆252Updated 3 months ago
- Herramienta de extracción de exploits desde Shodan Exploits para facilitar la búsqueda de vulnerabilidades conocidas. 👁☆25Updated 3 months ago
- Social Engineering Tactics contains real-world social engineering tactics used for manipulation, persuasion, and deception. Stay aware an…☆44Updated 9 months ago