mahmoudai1 / secure-chatLinks
Secure Chatting Application developed by PHP and JavaScript.
☆11Updated 3 years ago
Alternatives and similar repositories for secure-chat
Users that are interested in secure-chat are comparing it to the libraries listed below
Sorting:
- Google Chrome Cookies Stealer. Steals Chrome cookies☆47Updated 2 years ago
- UAdmin Phishlets for common sites☆16Updated 7 months ago
- Pathbyter is a lightning fast proof-of-concept ransomware that uses RSA wrapped AES, multiprocessing, in memory key encryption, appends e…☆26Updated 2 years ago
- web based c2 🏴☠️☆15Updated last year
- Complete Botnet Infrastucture with Malicious C&C Server And Malware Agents to infect Windows OS☆59Updated 2 months ago
- This is a working variant of the Mirai IOT botnet☆14Updated 3 years ago
- Automate Blind SQL Injection with Python.☆22Updated 3 years ago
- A PoC C2 tool utilizing Google Calendar events as a covert channel for communication between attacker and target.☆19Updated 2 years ago
- 🐢 Multiple Reverse Shell Handler | Stage 0/1 C2 Framework. Enhances Shell functionality and generates obfuscated powershell payload. Sup…☆17Updated 2 months ago
- Trojan written in C++ for Windows☆20Updated last year
- Malware Libraries focused in help Malware Development☆26Updated 2 years ago
- Experience the power of a PHP webshell designed to overcome the limitations of blacklisted system/exec functions.☆24Updated last year
- ProxyChecker Made in NodeJS☆37Updated 3 years ago
- Social Engineering Browser Update Attack.☆59Updated 2 years ago
- You should never use malware to infiltrate a target system. With the skill of writing and exploiting technical codes, you can do the best…☆93Updated 8 months ago
- A fast, lightweight botnet written in pure C.☆41Updated 4 years ago
- GrizzlyTunnel is a automation script designed to create seamless Layer 3 VPN like tunnels over SSH.☆26Updated last year
- Many times I have asked myself how to maintain access to a compromised WordPress site for the sake of surveillance/data gathering/etc... …☆25Updated last year
- FULLY UNDETECTABLE POWERSHELL BASED C2 FRAMEWORK☆16Updated 2 years ago
- A Fully Undectable RAT for Windows that bypass every kind of Antivirus Protections and will give u a CMD shell in your terminal☆47Updated 2 years ago
- Perform With Mass Exploiter In Joomla 4.2.8.☆35Updated 2 years ago
- A remote unauthenticated DOS POC exploit that targets the authentication implementation of Havoc.☆36Updated 2 years ago
- This will encrypt 🤐 your files using AES-256-CTR, then RSA-4096😵💫to secure the exchange with the server, or can use the Tor SOCKS5 Pr…☆80Updated 2 years ago
- AdminX it's a Malware to execute process as some users from a Windows OS☆11Updated 2 years ago
- A CRYPTOJACKING PROGRAM (MALWARE) >:)☆39Updated 4 years ago
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆51Updated 2 years ago
- CVE-2024-29895 PoC - Exploiting remote command execution in Cacti servers using the 1.3.X DEV branch builds☆23Updated last year
- Generate FUD Droppers that are undetectable by popular AV's☆32Updated 2 years ago
- Divulge Stealer a highly advanced info-stealer that outperforms its predecessor, Umbral-Stealer by Blank-c. This new iteration is a compl…☆16Updated last year
- This Python app allows users to inject malicious payloads into PDF files through a GUI. It supports three injection methods: URL, file, a…☆28Updated 2 years ago