Creating a Fake WhatsApp Message via SQLite: Understanding the Logic Behind the Manipulation
☆38Jul 28, 2025Updated 8 months ago
Alternatives and similar repositories for whatsapp-message-manipulation
Users that are interested in whatsapp-message-manipulation are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆15Nov 15, 2023Updated 2 years ago
- API Penetration Testing Notes☆16Sep 25, 2025Updated 6 months ago
- ☆12Aug 24, 2025Updated 7 months ago
- AutoAR is an automated security reconnaissance tool and Discord bot for bug bounty hunters and penetration testers. It automates gatherin…☆58Mar 21, 2026Updated last week
- Keklick - C2 Hunting, Reporting and Visualization Tool☆62Jul 23, 2025Updated 8 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Yet another machine learning-based WAF research☆26Jun 21, 2022Updated 3 years ago
- Cobalt Strike is threat emulation software. Red teams and penetration testers use Cobalt Strike to demonstrate the risk of a breach and e…☆16Oct 13, 2022Updated 3 years ago
- HTTP Header Analysis Vulnerability Tool☆14May 6, 2022Updated 3 years ago
- A "simplified" Docker setup script to deploy a local Supabase stack with minimal configuration.☆10Jun 17, 2025Updated 9 months ago
- Challenges for ImaginaryCTF 2025☆25Sep 7, 2025Updated 6 months ago
- ☆18Sep 28, 2023Updated 2 years ago
- CVE-2025-3248 Langflow RCE Exploit☆17Jun 17, 2025Updated 9 months ago
- uploads unlimited files to mega.nz without a subscription☆12Mar 19, 2026Updated last week
- this is how tenda's camera was pwned☆18Jun 3, 2025Updated 9 months ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Passcode widget bypass for Telegram Desktop☆11Sep 21, 2022Updated 3 years ago
- Multi-target unauthenticated RCE scanner for CVE-2025-34085 affecting WordPress Simple File List plugin. Uploads, renames, and triggers P…☆34Jul 13, 2025Updated 8 months ago
- Nexmo integration with Telegram☆11May 6, 2018Updated 7 years ago
- C programs for sockets, reverse shell, shellcode execution, and process injection.☆25Dec 10, 2025Updated 3 months ago
- ☆19Jul 9, 2021Updated 4 years ago
- Apache Tomcat(CVE-2024-50379)条件竞争致远程代码执行漏洞批量检测脚本☆19Apr 1, 2025Updated 11 months ago
- DoS Attacks on Bluetooth Devices for pentest purposes☆33Nov 22, 2025Updated 4 months ago
- Web Penetration Testing with Kali Linux - Third Edition, published by Packt☆31Jan 14, 2021Updated 5 years ago
- This is a VxLAN PoC code for Talks: From Spoofing to Tunneling: New Red Team's Networking Techniques for Initial Access and Evasion☆28Jul 21, 2025Updated 8 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- JWT key confusion attack, i.e. re-sigining RS256 to HS256☆13May 4, 2022Updated 3 years ago
- Simulated PoC for CVE-2025-2783 — a sandbox escape vulnerability in Chrome's Mojo IPC. Includes phishing delivery, memory fuzzing, IPC si…☆31Apr 6, 2025Updated 11 months ago
- A modern, lightweight web-based NVR (Network Video Recorder) interface for browsing camera recordings with a timeline view. Built with No…☆27Feb 23, 2026Updated last month
- Simple vtuber app.☆13Oct 17, 2022Updated 3 years ago
- Ce projet est un outil de génération de numéros de téléphone aléatoires et de vérification de l'opérateur associé à un numéro donné. L'ob…☆13Aug 18, 2023Updated 2 years ago
- Templtor is a bash script that will gather all the community Nuclei templates.☆31Dec 19, 2025Updated 3 months ago
- Detection for CVE-2025-68613☆29Dec 22, 2025Updated 3 months ago
- WordPress File Upload RCE Exploit☆16Sep 1, 2025Updated 6 months ago
- Composable agent runtime with enforced isolation boundaries☆42Mar 23, 2026Updated last week
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Metasploit-AI is a cutting-edge cybersecurity framework that combines the power of Metasploit with advanced artificial intelligence and m…☆50Aug 9, 2025Updated 7 months ago
- A Python-based backdoor and server communication tool for ethical hacking and reverse shell practice using socket programming.☆28May 21, 2025Updated 10 months ago
- ☆38Feb 9, 2025Updated last year
- Abusing SSRF to deliver an authenticated command injection payload☆29Sep 1, 2025Updated 6 months ago
- HackTheWeb is a production-ready, AI-powered web application penetration testing tool designed for security professionals and ethical hac…☆33Oct 5, 2025Updated 5 months ago
- A simple wallpaper app developed with Flutter, made responsive for Smartphone and Tablets.☆11Feb 6, 2023Updated 3 years ago
- Recently, the OpenSSH maintainers released security updates to fix a critical vulnerability that could lead to unauthenticated remote cod…☆12Jul 2, 2024Updated last year