robertdavidgraham / whats-decView external linksLinks
WhatsApp end-to-end media decryptor
☆94Mar 3, 2023Updated 2 years ago
Alternatives and similar repositories for whats-dec
Users that are interested in whats-dec are comparing it to the libraries listed below
Sorting:
- Prototype program to decode a video file looking for exploits/malware.☆17Jul 26, 2020Updated 5 years ago
- Identifies Bluetooth Low-energy devices☆16Jul 26, 2020Updated 5 years ago
- Parses DNS responses in a secure, rigorous manner☆22Jul 24, 2020Updated 5 years ago
- A simple python script to exploit vulnerable Firebase Database. If the owner of the app have set the security rules as true for both "rea…☆22Apr 22, 2024Updated last year
- A lexer and parser for Sleep☆20May 14, 2025Updated 9 months ago
- Python framework for manipulating bulk WHOIS data from RIRs☆22Jan 8, 2026Updated last month
- Simple web frontend to an elasticsearch database made for local files indexing☆19Oct 25, 2019Updated 6 years ago
- DomainsProject.org DNS worker☆26Aug 11, 2024Updated last year
- A threaded, recursive, web directory brute-force scanner over HTTP/2.☆36Feb 11, 2020Updated 6 years ago
- A non-math, but still technical, guide to cryptography☆24Jul 24, 2020Updated 5 years ago
- AES Ransomware in batch☆11Jun 25, 2024Updated last year
- C++ API for Buttplug IO☆12Aug 8, 2025Updated 6 months ago
- Get latest Exploit Databases notification on your Desktop☆16Jan 29, 2020Updated 6 years ago
- A 64-bit driver (Windows 7 and newer) for Immersion I-Force wheels, based on a driver binary released by Saitek.☆13Jan 31, 2024Updated 2 years ago
- Get notified instantly when your users of interest speak about something.☆10Mar 24, 2020Updated 5 years ago
- A curated lust of awesome cyber civil society actors, project etc.☆10Jul 16, 2020Updated 5 years ago
- Former UEFI Firmware Rootkit Replicating MoonBounce / ESPECTRE☆11Jun 14, 2022Updated 3 years ago
- A step-by-step walkthrough of how to write a Client and a Driver to communicate with each other and boost the priority of a thread.☆17Dec 12, 2023Updated 2 years ago
- IDS/IPS malware download evasion☆15Feb 21, 2019Updated 6 years ago
- A kernel driver to get a Handle to virtually *every* process☆13Jan 16, 2024Updated 2 years ago
- Fastly scans open ports on large networks and bruteforce login mechanism of found services☆12Aug 24, 2019Updated 6 years ago
- Decrypt video from a streaming site with MPEG-DASH Widevine DRM encryption.☆12Aug 1, 2020Updated 5 years ago
- A localhost implementation of a botnet used to perform a credential stuffing attack☆13Jan 14, 2021Updated 5 years ago
- c++ implementation of a simple-virtual-machine☆14Sep 19, 2014Updated 11 years ago
- Work in Progress repo☆15Apr 18, 2019Updated 6 years ago
- ☆14Jan 7, 2023Updated 3 years ago
- A port scanner written in PowerShell☆13Apr 14, 2021Updated 4 years ago
- Released presentations of my talks + code that used during these talks☆15Sep 5, 2024Updated last year
- A simple script to check for insecurely exposed git repositories.☆12Mar 17, 2019Updated 6 years ago
- An example of an external LLVM plugin module transform pass for the latest versions.☆14Oct 21, 2025Updated 3 months ago
- Silent Screenshot Capture | Post Exploitation Payload | VB.NET☆13May 10, 2020Updated 5 years ago
- Script for applied security baseline controls in RedHat/CentOS.☆12Jun 30, 2025Updated 7 months ago
- A lookup tool created to explore the NJ Arrest file from the FBI. Created for Hack Jersey 2.0☆14Apr 1, 2015Updated 10 years ago
- Command-line Remote Access Tool (RAT)☆13Jul 1, 2020Updated 5 years ago
- Brainfuck architecture module and loader for Binary Ninja☆20Jan 13, 2026Updated last month
- ZeroDay Cyber Research - ZCR Shellcoder Archive - z3r0d4y.com Shellcode Generator☆13Jul 29, 2016Updated 9 years ago
- Network sinkhole for isolated malware analysis☆40Mar 5, 2018Updated 7 years ago
- ☆12Mar 27, 2024Updated last year
- It's what all the kids are talking about☆12Apr 25, 2023Updated 2 years ago