POC | Steal user WhatsApp information/data
☆75May 10, 2025Updated 11 months ago
Alternatives and similar repositories for WhatsappStealer
Users that are interested in WhatsappStealer are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Stealing session (Steam, Telegram, Epicgames, ProtonVPN, Metamask) files from PC using Powershell, POC☆13Aug 11, 2023Updated 2 years ago
- Project Evoli. PyPi Extention for Creating Loggers,Grabbers and Rats☆20Jul 6, 2023Updated 2 years ago
- ☆11Dec 8, 2022Updated 3 years ago
- A "dream-come-true" for hackers and penetration testers, Venom RAT has managed to bring the best of both worlds into a single tool. You w…☆18Sep 22, 2023Updated 2 years ago
- Lightweight reflection scanner☆20Aug 31, 2025Updated 7 months ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- A python-based vulnerability scanner designed to identify open redirect flaws in website applications.☆24Mar 15, 2026Updated last month
- Deepwood- is an easy-to-use, Python-based RAT & Stealer, which send info to your webhook. You can recover passwords, aplication data, dis…☆14May 20, 2024Updated last year
- Advanced analysis software for APK payloads created by RATs.☆36Apr 5, 2026Updated last week
- This is the latest version of XenoRAT, updated with configurations and capable of bypassing all system securities. It will be maintained …☆23Apr 16, 2025Updated last year
- Best Discord Token Recovery Tool With Injection + More Sites☆18Jul 31, 2023Updated 2 years ago
- Spreads a message☆15Jun 20, 2021Updated 4 years ago
- A discord token grabber, crypto wallet stealer, cookie stealer, password stealer, file stealer etc☆14Jul 31, 2023Updated 2 years ago
- Ro3b - Advance Banking HTTP Botnet☆49Jun 12, 2023Updated 2 years ago
- Source code for my Discord.py Bot Dashboard streams☆11Aug 5, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A powerful Remote Administration Tool that uses Discord as C2. This means you can control your devices through Discord.☆60Jan 21, 2024Updated 2 years ago
- Vespy Logger but better fr. Part of vespy 2.0 project. This is a python open source stub builder that recovers personal information from …☆10Apr 24, 2023Updated 2 years ago
- This tool is for "educational" purpose only, and I am not responsible for any damage caused by it in any way!☆12May 2, 2023Updated 2 years ago
- CVE-2025-24016: Wazuh Unsafe Deserialization Remote Code Execution (RCE)☆43Feb 19, 2025Updated last year
- Stealthy Fully Undetectable (FUD) RAT with 15 plugins: stealer, crypto stealer, keylogger, remote desktop and more more...☆26Sep 13, 2023Updated 2 years ago
- A small webhook stealer written in python its a fake builder that has you input a webhook and that webhook will be sent to your webhook☆14Mar 25, 2022Updated 4 years ago
- ADR is a trojan that retrieves all information on the computer and all data stored in applications using chormuim. It recovers cookies, t…☆26Sep 5, 2023Updated 2 years ago
- Umbral Stealer is a fast, lightweight stealer written in C#. The collected data is transferred through discord webhooks.☆243Feb 6, 2024Updated 2 years ago
- Tutorials and Things to Do while Hunting Vulnerability.☆13Aug 30, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Fully Undetected Grabber (Grabs Wallets, Passwords, Cookies, Autofills, Information, Discord, Telegram)☆20Apr 8, 2024Updated 2 years ago
- An advanced XSS vulnerability scanner.☆11Feb 24, 2025Updated last year
- process hollowing variant using NtCreateSection + NtMapViewOfSection + ResumeThread☆31Jan 9, 2022Updated 4 years ago
- Passive Reconnaissance Techniques Approach helps for penetration testing and bug bounty hunting by gathering information about a target s…☆20Aug 19, 2025Updated 8 months ago
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆45Mar 8, 2024Updated 2 years ago
- Grep subdomains from web pages.☆42Feb 10, 2025Updated last year
- Get 10k subdomains in securitytrails using cookie without apikey.☆39Oct 23, 2025Updated 5 months ago
- A command line tool to interact with Microsoft Graph API☆23May 27, 2024Updated last year
- A powerful Burp Suite extension that automatically detects JavaScript URLs from HTTP traffic, scans them using TruffleHog for secrets det…☆31Oct 23, 2025Updated 5 months ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- How to Hack an Android Phone using an Malicious Android Application - Part-2 (More Sophisticated Way)☆11Oct 26, 2021Updated 4 years ago
- #SON-05 - An AI image generator site made using Imagen, Vertex AI and Google Cloud.☆13Apr 6, 2026Updated last week
- The Best Stealer, Fully Undetected Discord, Browser, Roblox Stealer, Cookie Password Token Stealer☆255Nov 10, 2023Updated 2 years ago
- An in-place obfuscator for python 3.11☆62Mar 10, 2024Updated 2 years ago
- Google Gemini Voice/Vision Assistant with gemini-1.5-pro / gemini-1.5-flash modal ! #Gemini 1.5 Flash #Gemini 1.5 Pro☆11May 18, 2024Updated last year
- CVE-2023-2255 Libre Office☆64Jul 10, 2023Updated 2 years ago
- BlitzSSH is a multi-threaded SSH brute-force tool with Telegram integration for real-time notifications.☆15Nov 20, 2025Updated 4 months ago