robertdavidgraham / whats-dec
WhatsApp end-to-end media decryptor
☆84Updated 2 years ago
Alternatives and similar repositories for whats-dec:
Users that are interested in whats-dec are comparing it to the libraries listed below
- Browser-based QRLJacking tool written in pure JavaScript. For educational use only.☆18Updated 6 months ago
- Self replicating and automatically spreading SSH worm that recovers login credentials☆51Updated last year
- Youtube as covert-channel - Control systems remotely and execute commands by uploading videos to Youtube☆111Updated last year
- recover Firefox and more browsers logins☆49Updated 3 years ago
- AES-256 Microsoft Cryptography API Example Use.☆31Updated last year
- Make an executable run with TrustedInstaller permissions under SYSTEM account.☆38Updated 4 years ago
- A privilege escalation vulnerability exists in Windows due to a flaw in the implementation of the Atom Table. An attacker could exploit t…☆26Updated 6 months ago
- Cross-platform RAT, written in C☆80Updated 2 years ago
- Create and enumerate hidden desktops.☆90Updated last year
- PoC to bypass mCaptcha and its rate limiting capabilities from a fully automated bot.☆47Updated 2 years ago
- DNS over HTTPS targeted malware (only runs once)☆96Updated last year
- Antiscan.me automatization script☆26Updated 10 months ago
- the assembly shell and backdoor Trojan☆19Updated 3 years ago
- Powershell implementation of a novel technique. Invoke-GPTObfuscation is a PowerShell Obfuscator that utilizes OpenAI (and other APIs) to…☆49Updated last year
- A PNG file-smuggling tool and library!☆24Updated 2 years ago
- Winsock accept() Backdoor Implant.☆112Updated 4 years ago
- Collection of source code for Polymorphic, Metamorphic, and Permutation Engines used in Malware☆26Updated 5 years ago
- A dynamic unpacking tool☆133Updated last year
- This is a free & Open source File dropper that is made strictly for EdUcAtIoNaL pUrPoSeS of course☆29Updated 2 years ago
- Sync RGB devices to your spotify songs. Sync your keyboard, sync your headset, sync your mouse, sync your toaster, sync your toilet, sync…☆32Updated 4 years ago
- ☆44Updated 3 years ago
- Remote Access Trojan I wrote, but didn't finish. Although, you could use this as is without many issues.☆37Updated 5 months ago
- ☆125Updated this week
- A payload delivery system which embeds payloads in an executable's icon file!☆72Updated last year
- Google Chrome Cookies Stealer. Steals Chrome cookies☆42Updated last year
- A Flask-based HTTP(S) command and control (C2) with a web frontend. Malleable agent written in Go.☆36Updated last year
- ☆32Updated last year
- Code snippets for bare-metal malware development☆98Updated 3 years ago
- PoC of a UEFI Petya ransomware☆41Updated 2 years ago
- ☆33Updated 2 years ago