robertdavidgraham / whats-enc
Reverse engineering WhatsApp Web.
☆51Updated 5 years ago
Alternatives and similar repositories for whats-enc:
Users that are interested in whats-enc are comparing it to the libraries listed below
- Decrypt WhatsApp encrypted media files☆969Updated 4 years ago
- make requests to apples bssid database☆13Updated 8 months ago
- Decrypt WhatsApp msgstore Crypt5☆73Updated 10 years ago
- Samsung ContainerAgent Vulnerability - Local DoS for Samsung smartphone☆71Updated 5 years ago
- Covid19 Tracker Apps☆68Updated 4 years ago
- I hacked Minesweeper into putting flags on all the mined squares when starting. Yoohoo.☆66Updated 6 years ago
- A Linux netfilter conntracking module that understands TLS records☆31Updated 10 years ago
- ☆46Updated last year
- Program for extracting TLS keys from Oculus Runtime☆50Updated 4 years ago
- Android application which allows sending SMS, with a specific SMSC without changing system defaults.☆12Updated 10 years ago
- Bootloader unlocking code for Motorola devices☆94Updated 8 years ago
- Look for interesting things in an APK and inject logging☆47Updated 11 years ago
- Locate Tinder users☆54Updated 5 years ago
- Checks Firefox saved passwords against known data leaks using the Have I Been Pwned API.☆85Updated 2 years ago
- WaitList.dat Parser☆26Updated 6 years ago
- Slide decks from my conference presentations☆35Updated 5 years ago
- A selection of script and the manual for Privacy International's data interception environment☆77Updated 3 years ago
- ☆38Updated 7 years ago
- Demonstrates how WhatsApp generates and recovers cipher keys from encrypted backup files on Android devices.☆69Updated 8 years ago
- The androidvulnerabilities.org website and source data☆21Updated 4 years ago
- 🌐 A DNS server where every IP address gets its own domain☆69Updated this week
- A Gamma muxing tool☆54Updated 5 years ago
- abuse ImageMagick (or GraphicsMagick) to create arbitrary files☆53Updated 2 months ago
- ☆91Updated 6 years ago
- F-Droid Fake Signer PoC☆110Updated last week
- Detecting SNI based censorship using Iterative Network Tracing☆14Updated 3 years ago
- ☆40Updated 5 months ago
- Analysis of archived Tor relay RSA public keys☆24Updated 7 years ago
- DNS tunnel☆60Updated 11 years ago
- Research and proof of concept to develop the next SecureDrop with end to end encryption.☆48Updated this week