robertdavidgraham / whats-decLinks
WhatsApp end-to-end media decryptor
☆94Updated 2 years ago
Alternatives and similar repositories for whats-dec
Users that are interested in whats-dec are comparing it to the libraries listed below
Sorting:
- PoC to bypass mCaptcha and its rate limiting capabilities from a fully automated bot.☆48Updated 3 years ago
- Encrypt your git repo...☆51Updated 3 years ago
- a cli google client that bypasses captcha and rate limiting by using the google alerts "preview" feature☆48Updated 2 years ago
- Self replicating and automatically spreading SSH worm that recovers login credentials☆55Updated 2 years ago
- fanny.bmp cleaned MALWARE - ONLY FOR ACADEMICAL RESEARCH AND EDUCATIONAL PURPOSES! (incl Metasploit detection Module)☆46Updated 7 months ago
- ☆32Updated 2 years ago
- Packet crafting, injection and sniffing tool☆70Updated last month
- Tools for maintaining access to systems and proof-of-concept demonstrations.☆178Updated last week
- Some Generic Browser Exploits (For Educational Purposes Only)☆30Updated 4 years ago
- A CLI tool which can be used to inject JavaScript into arbitrary Chrome origins via the Chrome DevTools Protocol☆46Updated 5 years ago
- Make an executable run with TrustedInstaller permissions under SYSTEM account.☆46Updated 5 years ago
- An End to End Encrypted SMS and SMS Tunneling app☆40Updated 2 years ago
- ☆27Updated 3 years ago
- ☆66Updated 4 years ago
- TikTok Scraper. Download video posts, collect user/trend/hashtag/music feed metadata, sign URL and etc.☆46Updated 4 years ago
- This is a simple example of DLL hijacking enabling proxy execution.☆70Updated 2 years ago
- Markov Model libraries, optimized for cracking-focused password generations.☆112Updated 4 years ago
- A framework for easy payloads development and deployment, collection of customizable XSS payloads☆26Updated 3 years ago
- Papers, presentations and documents from the team at Hacker House.☆52Updated last week
- A privilege escalation vulnerability exists in Windows due to a flaw in the implementation of the Atom Table. An attacker could exploit t…☆30Updated last year
- A Proof-of-Concept tool utilizing open DNS resolvers to produce an amplification attack against web servers. Using Shodan APIs and native…☆59Updated 3 years ago
- A way to use fonts to obfuscate text.☆50Updated 3 years ago
- A PNG file-smuggling tool and library!☆26Updated 2 years ago
- Cross platform system wide proxy server & TLS Interception library for Python☆23Updated 2 years ago
- ☆34Updated 8 years ago
- A simple and scalable Android bot emulation framework, as presented at Black Hat Europe 2021's Arsenal, as well as atHack 2021's Arsenal☆28Updated 4 years ago
- ☆59Updated 4 years ago
- Man in the Browser Framework☆48Updated last year
- Youtube as covert-channel - Control systems remotely and execute commands by uploading videos to Youtube☆107Updated 2 years ago
- a small wiper malware programmed in c#☆59Updated 3 years ago