imR0T – Encryption to Your Whatsapp Contact

imR0T : Send a quick message with simple text encryption to your whatsapp contact and , basically in ROT13 with new multi encryption based algorithm on ASCII and Symbols Substitution.

How To Use imR0T

It’s simple:

# Clone this repository
git clone https://github.com/Screetsec/imR0T.git

# Go into the repository
cd imR0T

# Permission Acces
chmod +x imR0T

# Run the app
./imR0T

Also ReadAutoRDPwn – The Shadow Attack Framework

Command Line

help: A standard command displaying help.

imR0T╺─╸[ cli ] > help

 | 
 | 
 |_ 
    Options:[arguments] 

      help       |:| show this message
      show       |:| show all modules from this tools
      list style |:| show list style  
      use        |:| use a module, ex : use [ID] 
      options    |:| show module options 
      run        |:| Execute the module 
      set        |:| Set a value
      back       |:| Back to main
      clear      |:| Clear window
      ls         |:| list directory content
      cat        |:| read file/standard input
      pwd        |:| print name of current/working director
      exit       |:| Exit program

Configuration

Before using feature send message to your whatsapp contact with text encryption. you must config file inconf/whatsapp.confand add your api key

# Getting API :
# Register in here https://www.apiwha.com/
# Use your mail or temp mail :P                     

# Setup API KEY
# Example : 
#     - api="CA6DSQ3CLPC6FCQ3CLPC6F"

api=""

Video Tutorial

Disclaimer

Modifications, changes, or alterations to this sourcecode is acceptable, however, any public releases utilizing this code must be approved by written this tool ( Edo maland ).

R K

Recent Posts

How UDP Works and Why It Is So Fast

When people ask how UDP works, the simplest answer is this: UDP sends data quickly…

4 days ago

How EDR Killers Bypass Security Tools

Endpoint Detection and Response (EDR) solutions have become a cornerstone of modern cybersecurity, designed to…

1 week ago

AI-Generated Malware Campaign Scales Threats Through Vibe Coding Techniques

A large-scale malware campaign leveraging AI-assisted development techniques has been uncovered, revealing how attackers are…

1 week ago

How Does a Firewall Work Step by Step

How Does a Firewall Work Step by Step? What Is a Firewall and How Does…

1 week ago

Fake VPN Download Trap Can Steal Your Work Login in Minutes

People trying to securely connect to work are being tricked into doing the exact opposite.…

1 week ago

This Android Bug Can Crack Your Lock Screen in 60 Seconds

A newly disclosed Android vulnerability is making noise for a good reason. Researchers showed that…

2 weeks ago