robertdavidgraham / whats-dec
WhatsApp end-to-end media decryptor
☆84Updated last year
Alternatives and similar repositories for whats-dec:
Users that are interested in whats-dec are comparing it to the libraries listed below
- Script to utilize the v2 pwndb onion site to find leaked passwords.☆19Updated 2 years ago
- Self replicating and automatically spreading SSH worm that recovers login credentials☆50Updated last year
- A privilege escalation vulnerability exists in Windows due to a flaw in the implementation of the Atom Table. An attacker could exploit t…☆26Updated 4 months ago
- Malware and malicious applications database☆37Updated 7 months ago
- Malware development: persistence - part 1: startup folder registry keys. C++ implementation☆12Updated 2 years ago
- Powershell implementation of a novel technique. Invoke-GPTObfuscation is a PowerShell Obfuscator that utilizes OpenAI (and other APIs) to…☆51Updated last year
- DNS over HTTPS targeted malware (only runs once)☆95Updated last year
- ☆32Updated last year
- An AV exclusion enumeration tool written in Python.☆59Updated 2 years ago
- A script that can see if an email address is valid in Office365 (user/email enumeration). This does not perform any login attempts, is u…☆30Updated 3 years ago
- Winsock accept() Backdoor Implant.☆111Updated 3 years ago
- Make an executable run with TrustedInstaller permissions under SYSTEM account.☆38Updated 4 years ago
- Sync RGB devices to your spotify songs. Sync your keyboard, sync your headset, sync your mouse, sync your toaster, sync your toilet, sync…☆32Updated 3 years ago
- Cross-platform RAT, written in C☆80Updated 2 years ago
- Zippo is a archive payload generator for testing XSS, (Zip/Tar/Gzip) slip vulnerabilities.☆25Updated 3 years ago
- Windows-only Remote Access Tool (RAT) with anti-debugging and anti-sandbox checks. For educational purposes only.☆49Updated 3 years ago
- Modular reverse shell server with a Discord frontend and example payloads☆28Updated 4 years ago
- PoC to bypass mCaptcha and its rate limiting capabilities from a fully automated bot.☆47Updated 2 years ago
- a small wiper malware programmed in c#☆50Updated 2 years ago
- AES-256 Microsoft Cryptography API Example Use.☆30Updated last year
- SSH Honeypot that gathers creds and attempted commands☆19Updated 3 years ago
- This is a simple example of DLL hijacking enabling proxy execution.☆65Updated last year
- Encrypt your git repo...☆44Updated 2 years ago
- ☆25Updated 3 years ago
- HTTPBotNet☆21Updated 3 months ago
- Youtube as covert-channel - Control systems remotely and execute commands by uploading videos to Youtube☆110Updated last year
- A simple python script to exploit vulnerable Firebase Database. If the owner of the app have set the security rules as true for both "rea…☆20Updated 9 months ago
- Browser-based QRLJacking tool written in pure JavaScript. For educational use only.☆18Updated 4 months ago
- Man in the Browser Framework☆42Updated last month
- Create and enumerate hidden desktops.☆90Updated last year