robertdavidgraham / whats-decLinks
WhatsApp end-to-end media decryptor
☆87Updated 2 years ago
Alternatives and similar repositories for whats-dec
Users that are interested in whats-dec are comparing it to the libraries listed below
Sorting:
- Sync RGB devices to your spotify songs. Sync your keyboard, sync your headset, sync your mouse, sync your toaster, sync your toilet, sync…☆32Updated 4 years ago
- PoC to bypass mCaptcha and its rate limiting capabilities from a fully automated bot.☆47Updated 2 years ago
- ☆33Updated last year
- Packet crafting, injection and sniffing tool☆66Updated last week
- fanny.bmp cleaned MALWARE - ONLY FOR ACADEMICAL RESEARCH AND EDUCATIONAL PURPOSES! (incl Metasploit detection Module)☆43Updated last week
- Self replicating and automatically spreading SSH worm that recovers login credentials☆52Updated last year
- Some of CrackMes made by me :)☆18Updated 3 years ago
- A privilege escalation vulnerability exists in Windows due to a flaw in the implementation of the Atom Table. An attacker could exploit t…☆28Updated 10 months ago
- Cross-platform RAT, written in C☆86Updated 2 years ago
- a cli google client that bypasses captcha and rate limiting by using the google alerts "preview" feature☆48Updated last year
- A PNG file-smuggling tool and library!☆25Updated 2 years ago
- AES-256 Microsoft Cryptography API Example Use.☆31Updated last year
- Local Privilege Escalation Miner☆27Updated 3 years ago
- Malware and malicious applications database☆38Updated last year
- Windows Keylogger in C++☆19Updated 2 years ago
- ☆37Updated 4 months ago
- ☆34Updated 7 years ago
- A simple and scalable Android bot emulation framework, as presented at Black Hat Europe 2021's Arsenal, as well as atHack 2021's Arsenal☆29Updated 3 years ago
- Encrypt your git repo...☆48Updated 3 years ago
- Powershell implementation of a novel technique. Invoke-GPTObfuscation is a PowerShell Obfuscator that utilizes OpenAI (and other APIs) to…☆49Updated last year
- General malware analysis stuff☆37Updated 10 months ago
- shellcode are codes designed to be injected into the memory space of another process during exploitation.☆49Updated 4 years ago
- A simple python script to exploit vulnerable Firebase Database. If the owner of the app have set the security rules as true for both "rea…☆21Updated last year
- A Flask-based HTTP(S) command and control (C2) with a web frontend. Malleable agent written in Go.☆36Updated last year
- SSH Honeypot that gathers creds and attempted commands☆19Updated 4 years ago
- Repository dedicated to storing a multitude of iOS/macOS/OSX/watchOS crash bugs. Some samples need to be viewed as raw in order to see th…☆40Updated 6 years ago
- Remote Access Trojan I wrote, but didn't finish. Although, you could use this as is without many issues.☆38Updated 8 months ago
- Browser-based QRLJacking tool written in pure JavaScript. For educational use only.☆18Updated 10 months ago
- Code snippets for bare-metal malware development☆98Updated 3 years ago
- This repo contains all the code that will be referred at https://scriptdotsh.com by Paranoid Ninja☆46Updated 4 years ago