A tool for steganography of png files .
☆24Jul 27, 2022Updated 3 years ago
Alternatives and similar repositories for phoenix
Users that are interested in phoenix are comparing it to the libraries listed below
Sorting:
- This a Complete tool contained box for Capture The Flag competition. Mostly I have inserted all the necessary tools. Some of the people h…☆11Apr 16, 2022Updated 3 years ago
- Another vulnerability scanner☆18Aug 9, 2025Updated 6 months ago
- Central IoC scanner based on Loki☆20Nov 12, 2021Updated 4 years ago
- A fast, powerful open-source password generator with hexagonal architecture. Features a zero-dependency core, Web UI demo, CLI tool, and …☆21Feb 9, 2026Updated 3 weeks ago
- Probe: This is a special tool for bug hunter for automated recon process smoothly.☆24Jan 29, 2024Updated 2 years ago
- WolverineFramework - Free, OpenSource and easy to use Cybersecurity Framework.☆22Apr 19, 2022Updated 3 years ago
- A wacky exploitation framework written in pure python3.☆23Mar 24, 2024Updated last year
- An exotic service bruteforce tool.☆13Apr 12, 2025Updated 10 months ago
- ☆22Jul 13, 2022Updated 3 years ago
- 🐚ᴠʟᴀɴɢ ʀᴇᴠᴇʀsᴇ sʜᴇʟʟ🐚☆11Apr 28, 2022Updated 3 years ago
- Command and Control Framework☆13Mar 23, 2024Updated last year
- Simple API for storing all incoming XSS requests and various XSS templates.☆48Jul 18, 2024Updated last year
- A reverse TCP payload and listener both written in python3.☆30Jun 4, 2024Updated last year
- Development of Botnet Detection Module for Traffic-Based IoT Devices Using Deep Learning☆14Dec 26, 2022Updated 3 years ago
- PHP lab to test captcha bypassing☆30Jan 8, 2024Updated 2 years ago
- Mango is a user interactive Powershell program to search for possible privilege escalation vectors on windows☆15Aug 4, 2021Updated 4 years ago
- Forensic Imaging quickstarts!☆13Aug 12, 2022Updated 3 years ago
- VOID is for scanning and hacking. There is many popular tools in VOID. You can scan web databases and vulnerabilities. Also you can brute…☆38May 23, 2022Updated 3 years ago
- Just another vulnerable web application.☆36Jul 27, 2024Updated last year
- A Flask-based HTTP(S) command and control (C2) with a web frontend. Malleable agent written in Go.☆36Aug 12, 2023Updated 2 years ago
- ⛤Keylogger Generator for Windows written in Python⛤☆55Jun 9, 2023Updated 2 years ago
- A forensic analysis framework for enumerating slack artifacts residing in the Operating system.☆18Sep 23, 2025Updated 5 months ago
- A ZAPROXY Add-on that allows testing of web application vulnerabilities by recording complex multi-step sequences. You can test applica…☆22May 14, 2025Updated 9 months ago
- Find subdomains by searching public certificate records☆16Jun 11, 2024Updated last year
- ☆15Oct 25, 2022Updated 3 years ago
- The long shadow to emerge as other Git repositories☆18Jul 8, 2024Updated last year
- This repository contains several AMSI bypasses. These bypasses are based on some very nice research that has been put out by some awesome…☆23Jul 7, 2022Updated 3 years ago
- This tool is intended to be used for on target enumeration to gather and exfiltrate information and then to upload tools such as netcat o…☆22Jan 6, 2026Updated last month
- A tool that encrypt and hide your data inside your images.☆29Oct 24, 2021Updated 4 years ago
- Fast, cross-platform PowerShell module to find files & folders, grep file content, and measure sizes—Linux-style find/grep/du made simple…☆22Dec 20, 2025Updated 2 months ago
- A Hacking and Pentesting Tool for Windows☆20Jul 17, 2025Updated 7 months ago
- Sifter - All purpose penetration testing op-center☆82Nov 23, 2022Updated 3 years ago
- Simple python OSINT tool for urls recon thanks to the waybackmachine.☆45Jun 19, 2023Updated 2 years ago
- Post-exploitation tool collects data going out and coming into the browser and makes use of it.☆23Apr 22, 2022Updated 3 years ago
- Wazuh extension looking up alert data against indicators in OpenCTI threat intel☆21Feb 4, 2024Updated 2 years ago
- Run payload like a Lazarus Group (UuidFromStringA). C++ implementation☆20Jul 24, 2022Updated 3 years ago
- Uhuru OS - a Distro focused on enhancement several types of security☆42Jun 23, 2023Updated 2 years ago
- Small python script to look for common vulnerabilities on SMTP server.☆48Dec 17, 2023Updated 2 years ago
- Venom is a collaborative C2 framework used by Red Team operators. providing an interactive Web GUI written in Python and PowerShell.☆19Jul 14, 2022Updated 3 years ago