An End to End Encrypted SMS and SMS Tunneling app
☆40Apr 27, 2023Updated 2 years ago
Alternatives and similar repositories for SpiderSMS
Users that are interested in SpiderSMS are comparing it to the libraries listed below
Sorting:
- vusialization of geo points from photos from vk profile☆48Feb 16, 2022Updated 4 years ago
- PoC for CVE-2021-3129 (Laravel)☆12Oct 9, 2021Updated 4 years ago
- POC for scanning ProxyShell(CVE-2021-34523,CVE-2021-34473,CVE-2021-31207)☆16Oct 6, 2021Updated 4 years ago
- Phishing instagram,vk,tiktok telegram☆71Apr 23, 2023Updated 2 years ago
- A python app using kivy and pynput to log and upload mouse dynamics.☆27Apr 24, 2022Updated 3 years ago
- User-mode part of Zerokit platform☆22Mar 30, 2019Updated 6 years ago
- the metasploit script(POC/EXP) about CVE-2021-22005 VMware vCenter Server contains an arbitrary file upload vulnerability☆22Oct 2, 2021Updated 4 years ago
- CVE-2021-1675 LPE PoC in Nim (PrintNightmare Local Privilege Escalation)☆18Dec 5, 2021Updated 4 years ago
- This is a python script that exploits wget when being set with a SUID bit, and overwrites the root password.☆40Mar 27, 2024Updated last year
- Strumenti per rilevare ed estrarre informazioni nascoste all'interno di file.☆44Apr 17, 2023Updated 2 years ago
- Framework for Telegram users and chats investigating☆74Jun 5, 2025Updated 8 months ago
- Encrypted Shellcode Loader Generator☆22Jan 29, 2019Updated 7 years ago
- Malware development: persistence - part 1: startup folder registry keys. C++ implementation☆12Apr 21, 2022Updated 3 years ago
- A template for standard Maltego transformation☆13Dec 8, 2021Updated 4 years ago
- Zerokit shared code☆17Mar 28, 2019Updated 6 years ago
- Search-Scan-Save-Notify☆11May 12, 2025Updated 9 months ago
- ☆12Jan 9, 2023Updated 3 years ago
- Forensic Analysis of Signal, Wickr, Threema - Decrypt all databases and multimedia files☆77Jan 10, 2022Updated 4 years ago
- Repository and archive for Killing The Bear Gitbook☆83Aug 15, 2023Updated 2 years ago
- ☆14Oct 5, 2019Updated 6 years ago
- Antivirus Signature Search Toolkit☆81Apr 30, 2023Updated 2 years ago
- ☆10Jun 10, 2023Updated 2 years ago
- Analysis and Modification Tool for Executables☆17Mar 28, 2019Updated 6 years ago
- 🌐 The BRUTAL operating system project blog and landing page☆10May 29, 2022Updated 3 years ago
- Collect data about commertial organizations from 2gis.ru.☆13Feb 10, 2018Updated 8 years ago
- A sample POC for CVE-2021-30657 affecting MacOS☆30Nov 8, 2021Updated 4 years ago
- A privilege escalation vulnerability exists in Windows due to a flaw in the implementation of the Atom Table. An attacker could exploit t…☆29Sep 18, 2024Updated last year
- Helping to automate payload development, testing, Opsec checking, beacon tasking, and deployment for Cobalt Strike☆51Jun 18, 2022Updated 3 years ago
- This tool bruteforces the file offset and base load address for a raw binary program file☆16Dec 31, 2025Updated 2 months ago
- SpyStroke is an advanced and lightweight keylogger designed for ethical hacking and cybersecurity research. It captures keystrokes silent…☆14Jul 28, 2025Updated 7 months ago
- An injector that use PT_LOAD technique☆12Nov 27, 2022Updated 3 years ago
- Geolocate your files!☆16Jan 7, 2022Updated 4 years ago
- Codec is a collaborative tool for managing video evidence.☆65Aug 4, 2025Updated 6 months ago
- ☆53Apr 19, 2023Updated 2 years ago
- Without closing windows defender, to make defender useless by removing its token privileges and lowering the token integrity.☆31Mar 13, 2022Updated 3 years ago
- ☆11May 6, 2021Updated 4 years ago
- simply manual map any system image☆18Feb 1, 2021Updated 5 years ago
- Static and Dynamic Analysis of Malware Samples☆12Mar 12, 2020Updated 5 years ago
- Demo projects using virt86☆13Jul 5, 2019Updated 6 years ago