aleixrodriala / wa-tunnel
Tunneling Internet traffic over Whatsapp
☆2,113Updated last year
Related projects: ⓘ
- Store files as YouTube videos == infinite disk space☆1,905Updated 6 years ago
- KeyDecoder app lets you use your smartphone or tablet to decode your mechanical keys in seconds.☆3,030Updated 7 months ago
- apk.sh makes reverse engineering Android apps easier, automating some repetitive tasks like pulling, decoding, rebuilding and patching an…☆3,308Updated last month
- Automagically reverse-engineer REST APIs via capturing traffic☆5,018Updated 3 weeks ago
- HiddenVM — Use any desktop OS without leaving a trace.☆2,324Updated 2 months ago
- a file-sharing tool that allows you to find the responsible person in case of a leakage☆1,026Updated 2 years ago
- A Pluggable Authentication Module (PAM) which allows the establishment of alternate passwords that can be used to perform actions to clea…☆1,331Updated 2 months ago
- Extract files from any kind of container formats☆2,145Updated this week
- Browser extension to spoof timezone, geolocation, locale and user agent.☆1,805Updated 11 months ago
- Answering the question nobody asked: what if you wanted to text your friends using only ARP?☆2,468Updated last year
- The Deepfake Offensive Toolkit☆4,081Updated 3 months ago
- Connect like there is no firewall. Securely.☆1,458Updated 2 weeks ago
- MD5-Monomorphic Shellcode Packer - all payloads have the same MD5 hash☆775Updated last year
- A collaboratively curated list of awesome Open-Source Intelligence (OSINT) Resources☆1,786Updated this week
- Free copy of The Cyber Plumber's Handbook - The definitive guide to Secure Shell (SSH) tunneling, port redirection, and bending traffic l…☆2,565Updated 2 years ago
- TinyCheck allows you to easily capture network communications from a smartphone or any device which can be associated to a Wi-Fi access p…☆3,078Updated 4 months ago
- An Open-source LTE Downlink/Uplink Eavesdropper☆1,381Updated 5 months ago
- dnsReaper - subdomain takeover tool for attackers, bug bounty hunters and the blue team!☆1,978Updated last week
- Browser In The Browser (BITB) Templates☆2,755Updated 7 months ago
- A Chrome extension that will steal literally everything it can☆659Updated 6 months ago
- Credentials Dumper for Linux using eBPF☆1,111Updated last week
- Better privacy without special software☆1,691Updated last month
- AutoPWN Suite is a project for scanning vulnerabilities and exploiting systems automatically.☆931Updated last month
- Protect yourself from being tracked 🌍 by AirTags 🏷 and Find My accessories 📍☆1,912Updated this week
- cast YouTube videos to your smart TV from command-line☆742Updated 7 months ago
- NAT Slipstreaming allows an attacker to remotely access any TCP/UDP services bound to a victim machine, bypassing the victim’s NAT/firewa…☆1,897Updated last year
- OSINT from your favorite services in a friendly terminal user interface - integrations for Virustotal, Shodan, and Censys☆977Updated last month
- SkySafe Miscellaneous Reverse Engineering Blog☆754Updated 8 months ago
- Redirect `.idk` domains using Wikipedia☆1,525Updated 4 months ago
- Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins, pwnkit, dirty pipe, +w docker.sock☆6,604Updated 6 months ago