AttackIQ / data-obfuscator
A tool to embed files into images
☆11Updated 3 years ago
Alternatives and similar repositories for data-obfuscator:
Users that are interested in data-obfuscator are comparing it to the libraries listed below
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBin☆15Updated 4 years ago
- Analyze Windows Systems for common and unique vulnerabilities☆9Updated 2 years ago
- ☆12Updated 4 years ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆18Updated 3 years ago
- A tool that adds reproducible UUIDs to YARA rules☆13Updated 8 months ago
- MAC Address brute forcing tool, used to bypass MAC based filtering☆14Updated 2 years ago
- A Python script to find tenant id an region from a list of domain names.☆12Updated last year
- Mass Assigner is a simple tool made to probe for mass assignment vulnerability through JSON field modification in HTTP requests☆12Updated 6 months ago
- The Catherine Framework is a general-purpose cybersecurity framework built to provide extended support for defense operations.☆16Updated 9 months ago
- A python script file to statically and dynamically investigate and analyse binary files for buffer overflow exploits.☆10Updated 7 months ago
- ☆13Updated 3 years ago
- Some Pentesting Scripts☆10Updated 3 years ago
- CRACK AND CHECK HASH TYPES IN BULK☆12Updated 3 years ago
- A C# Tool to gather information about email breaches☆13Updated last year
- ☆11Updated 4 years ago
- Serving files with conditions, serverside keying and more.☆18Updated 2 years ago
- Simple C2 over the Trello API☆37Updated 2 years ago
- Simple utility to manage multiple ssh☆14Updated 2 years ago
- EventLogSilencer is a PowerShell script designed for disable Windows Event Logging☆14Updated last year
- Fast DNS history enumeration tool for network and OSINT investigations☆16Updated 4 years ago
- A tool for simplifying the process of researching IOCs.☆24Updated 3 years ago
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆9Updated 2 years ago
- Proof of Concept in Go from Secureworks' research on Azure Active Directory Brute-Force Attacks. Inspired by @treebuilder's POC on PowerS…☆13Updated 2 years ago
- Code for profiling sandboxes - Initially an idea to profile sandboxes, the code is written to take enviromental variables and send them b…☆20Updated 8 months ago
- A parallel scanner that utilises axiom to spin up servers and parallel scan using masscan.☆16Updated 4 years ago
- parsers to make life easier☆12Updated 4 years ago