A Python based backdoor that uses Steganography and a Cloud Image Service as a command and control server.
☆25Sep 2, 2016Updated 9 years ago
Alternatives and similar repositories for stegator
Users that are interested in stegator are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Local enumeration and exploitation framework.☆18Aug 16, 2017Updated 8 years ago
- A fully featured Windows backdoor that uses email as a C&C server☆16Aug 19, 2017Updated 8 years ago
- An offensive bash script which tries to find GENERIC privesc vulnerabilities and issues.☆13Oct 17, 2017Updated 8 years ago
- Exploit kit analyzer☆22Mar 3, 2015Updated 11 years ago
- Reference material for fuzzing and creating fuzzers☆19Apr 6, 2019Updated 7 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Call your own DLL from VBA and execute code under process svchost.exe with WMI☆12Mar 6, 2020Updated 6 years ago
- Netcap Tensorflow Deep Neural Network☆15Apr 26, 2020Updated 6 years ago
- DIY bad USB [shellcode injector] using arduino [AVR family microcontrollers] to exploit windows targets.☆16Aug 17, 2015Updated 10 years ago
- DEPRECATED avatar-panda repository; please use https://github.com/panda-re/panda☆13Mar 19, 2021Updated 5 years ago
- Frontend to import Nmap Scan in ES, and frontend to make search☆10Nov 16, 2014Updated 11 years ago
- Another Remote Access Control software, written in Golang. It heavily relies on cryptography to avoid threat of botnet use/abuse by other…☆11Jan 12, 2017Updated 9 years ago
- Read Magnetic stripe data using square card reader☆13Jul 12, 2013Updated 12 years ago
- FWRF is a open source tool for firmware web-side analysis.☆11Aug 27, 2015Updated 10 years ago
- ☆10Oct 22, 2017Updated 8 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Here comes the paintrain!☆11Aug 8, 2016Updated 9 years ago
- ☆10May 25, 2023Updated 2 years ago
- ☆26Jun 2, 2023Updated 2 years ago
- Create a worm that bruteforces SSH and "infect" the system.☆26Feb 4, 2017Updated 9 years ago
- Some setup scripts for security research tools.☆11May 10, 2015Updated 11 years ago
- Replaces all .jpg and .png with a picture of nicolas cage.☆10Jun 10, 2014Updated 11 years ago
- Tool to identify all domains contained in an IP anonymously☆15Jun 4, 2017Updated 8 years ago
- ☆13Jun 11, 2014Updated 11 years ago
- Remote Thread Injection by C# + Delegate Techniques☆12Jun 6, 2023Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Lansweeper Password Recovery Tool☆11Jul 2, 2016Updated 9 years ago
- ☆28Oct 30, 2016Updated 9 years ago
- An automated Python + Ruby based XXE Exploiter (GUI + CLI)☆19Aug 2, 2016Updated 9 years ago
- Efficient clustering of MASSCAN results☆12Dec 26, 2016Updated 9 years ago
- A proxy for allowing a public IP address to host a service actually provided by a hidden backend.☆15Jul 12, 2016Updated 9 years ago
- iOS 12.0 -> 12.1.2 _kernproc and _rootvnode offsets for 16K devices☆11Feb 15, 2019Updated 7 years ago
- Scans the internet for open FTP servers looking for common malware bot droppers and grabs them for sampling. Also provides support for up…☆49Feb 15, 2017Updated 9 years ago
- Threat Intel and Incident Reponse☆10Aug 29, 2018Updated 7 years ago
- Deploy multiple instances of Nessus in docker containers easily☆20Mar 31, 2021Updated 5 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- ☆21Sep 5, 2016Updated 9 years ago
- ☆13Jan 20, 2017Updated 9 years ago
- Powershell tool to download malware samples.☆12Feb 10, 2016Updated 10 years ago
- POC for IAT Parsing Payloads☆48Jan 1, 2017Updated 9 years ago
- WhatsApp Registration Tool☆11Sep 6, 2013Updated 12 years ago
- A tool to visually snapshot a website by supplying multiple user-agent. Designed to aid in discovery of different entry points into an ap…☆31May 6, 2016Updated 10 years ago
- A scalable framework for binary analysis in a containered environment.☆13May 20, 2019Updated 7 years ago