imR0T – Encryption to Your Whatsapp Contact

imR0T : Send a quick message with simple text encryption to your whatsapp contact and , basically in ROT13 with new multi encryption based algorithm on ASCII and Symbols Substitution.

How To Use imR0T

It’s simple:

# Clone this repository
git clone https://github.com/Screetsec/imR0T.git

# Go into the repository
cd imR0T

# Permission Acces
chmod +x imR0T

# Run the app
./imR0T

Also ReadAutoRDPwn – The Shadow Attack Framework

Command Line

help: A standard command displaying help.

imR0T╺─╸[ cli ] > help

 | 
 | 
 |_ 
    Options:[arguments] 

      help       |:| show this message
      show       |:| show all modules from this tools
      list style |:| show list style  
      use        |:| use a module, ex : use [ID] 
      options    |:| show module options 
      run        |:| Execute the module 
      set        |:| Set a value
      back       |:| Back to main
      clear      |:| Clear window
      ls         |:| list directory content
      cat        |:| read file/standard input
      pwd        |:| print name of current/working director
      exit       |:| Exit program

Configuration

Before using feature send message to your whatsapp contact with text encryption. you must config file inconf/whatsapp.confand add your api key

# Getting API :
# Register in here https://www.apiwha.com/
# Use your mail or temp mail :P                     

# Setup API KEY
# Example : 
#     - api="CA6DSQ3CLPC6FCQ3CLPC6F"

api=""

Video Tutorial

Disclaimer

Modifications, changes, or alterations to this sourcecode is acceptable, however, any public releases utilizing this code must be approved by written this tool ( Edo maland ).

R K

Recent Posts

Pystinger : Bypass Firewall For Traffic Forwarding Using Webshell

Pystinger is a Python-based tool that enables SOCKS4 proxying and port mapping through webshells. It…

6 days ago

CVE-Search : A Tool To Perform Local Searches For Known Vulnerabilities

Introduction When it comes to cybersecurity, speed and privacy are critical. Public vulnerability databases like…

6 days ago

CVE-Search : A Tool To Perform Local Searches For Known Vulnerabilities

Introduction When it comes to cybersecurity, speed and privacy are critical. Public vulnerability databases like…

6 days ago

How to Bash Append to File: A Simple Guide for Beginners

If you are working with Linux or writing bash scripts, one of the most common…

6 days ago

Mastering the Bash Case Statement with Simple Examples

What is a bash case statement? A bash case statement is a way to control…

7 days ago

How to Check if a File Exists in Bash – Simply Explained

Why Do We Check Files in Bash? When writing a Bash script, you often work…

1 week ago