SSTap and SocksCap64 is no longer maintained. [Details...]
CPU: Intel Core i5-4460 3.2GHz / AMD FX-6300
RAM: 8 GB
OS: Win 7 64
CPU: Intel Core i3-2100 3.1GHz / AMD Phenom II X4 965
RAM: 8 GB
OS: Win 7 64
CPU: Intel Core i5-2400S 2.5GHz / AMD FX-6350
RAM: 6 GB
OS: Win 7 64
CPU: Intel Core i5-6600K 3.5GHz / AMD FX-8350
RAM: 8 GB
OS: Win 7 64
CPU: Intel Core i5-2500K 3.3GHz / AMD FX-8320
RAM: 8 GB
OS: Win 7 64
CPU: Intel Core i5-3470 3.2GHz / AMD FX-4350
RAM: 8 GB
OS: Win 7 64
CPU: Intel Core 2 Quad Q6600 2.4GHz / AMD Phenom 9850 Quad-Core Black Edition
RAM: 4 GB
OS: Win 7 64
CPU: Intel Core i5-2500K 3.3GHz / AMD FX-8320
RAM: 8 GB
OS: Win 7 64

You're referring to the WhatsApp exploit known as "WhatsApp 4X patched" or more accurately, "WhatsApp exploit (CVE-2019-8942)" which was patched by the developers. I'll create an informative piece on this topic.

The patch was rolled out on May 13, 2019, and users were strongly advised to update their WhatsApp application to prevent potential attacks. whatsapp sh4x patched

The WhatsApp development team quickly responded to the vulnerability by releasing an emergency patch. The patch, version 2.19.134 for Android and 2.19.51 for iOS, fixed the buffer overflow vulnerability, preventing attackers from exploiting the vulnerability. You're referring to the WhatsApp exploit known as

In May 2019, a severe vulnerability was discovered in WhatsApp, a popular messaging app used by millions worldwide. The exploit, identified as CVE-2019-8942, allowed attackers to intercept and manipulate messages sent via WhatsApp, putting users' sensitive information at risk. This critical vulnerability became known as the "WhatsApp 4X patched" or simply "WhatsApp 4X exploit." The WhatsApp development team quickly responded to the