330k / misc_toolsLinks
Miscellaneous Tools
☆51Updated 2 months ago
Alternatives and similar repositories for misc_tools
Users that are interested in misc_tools are comparing it to the libraries listed below
Sorting:
- Crack legacy zip encryption with Biham and Kocher's known plaintext attack. 使用明文攻击破解加密的 zip 文件☆109Updated 2 years ago
- Zero-Width Space Steganography, encodes/decodes hidden messages as non printable/readable characters.☆39Updated 6 years ago
- No Sandbox - Applications That Run Chromium and Chrome Without The Sandbox. TL;DR exploits in these browser based applications are alread…☆187Updated 4 years ago
- A Docker image with four popular Java decompilers in one place (CFR, Fernflower, Krakatau, and Procyon)☆75Updated 3 years ago
- Sequoia exploit (7/20/21)☆78Updated 4 years ago
- A steganography tool for embedding payloads within Python bytecode.☆155Updated 6 years ago
- 🔒 Encrypt messages with emojis using AES.☆51Updated 9 months ago
- Stegdetect is an automated tool for detecting steganographic content in images.☆69Updated 3 years ago
- x64 printable shellcode encoder☆157Updated 5 years ago
- jphide & seek steganography tools☆88Updated 8 years ago
- A Text <-> Brainfuck/Ook webinterface☆77Updated last year
- Tool to hide data in MP3files☆63Updated 2 weeks ago
- A tool for converting Python source code to opcode(pickle)☆21Updated 3 years ago
- Run CTF challenges with netcat in one docker container.☆40Updated 2 years ago
- some fun php exploits☆81Updated last year
- CVE Exploit PoC's☆34Updated 2 years ago
- Copy as requests plugin for Burp Suite☆67Updated last year
- Volatility Linux Profiles☆27Updated 11 years ago
- CVE-2021-3156☆111Updated 5 years ago
- 网安图书馆:文档。☆175Updated 6 years ago
- SilentEye is a cross-platform application design for an easy use of steganography☆137Updated 2 years ago
- Breaking git with a carriage return and cloning RCE☆50Updated 6 months ago
- encode a bash command with charset $, (, ), #, !, {, }, <, \, '.☆72Updated 6 years ago
- Automated tool implementing Hash Length Extension Attack in MD4,MD5,SHA1,SHA256,SHA512 along with an example☆25Updated last year
- Volatility Explorer Suit☆66Updated 3 years ago
- ☆199Updated 8 years ago
- ☆63Updated 4 years ago
- A CTF online judge platform developed by Tp0t.☆51Updated last year
- implements php-style serialize/unserialize for python 3.7+☆38Updated 3 years ago
- Huorong Internet Security vulnerabilities 火绒安全软件漏洞☆112Updated 5 years ago