AttackIQ / data-obfuscator
A tool to embed files into images
☆11Updated 3 years ago
Related projects ⓘ
Alternatives and complementary repositories for data-obfuscator
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆18Updated 3 years ago
- Static analysis of APKs with regular expressions☆10Updated 3 years ago
- MAC Address brute forcing tool, used to bypass MAC based filtering☆14Updated 2 years ago
- The Catherine Framework is a general-purpose cybersecurity framework built to provide extended support for defense operations.☆16Updated 6 months ago
- Code for profiling sandboxes - Initially an idea to profile sandboxes, the code is written to take enviromental variables and send them b…☆19Updated 6 months ago
- just manipulatin these here tokens yes sir nothing weird☆22Updated 2 years ago
- ☆12Updated 3 years ago
- CRACK AND CHECK HASH TYPES IN BULK☆12Updated 3 years ago
- Analyze Windows Systems for common and unique vulnerabilities☆9Updated 2 years ago
- Simple tools to handle string and generate subdomain permutations☆14Updated 2 years ago
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆26Updated last year
- Helper script for BloodHound to automatically add relationships between multiple accounts owned by the same individual☆12Updated 2 years ago
- A parallel scanner that utilises axiom to spin up servers and parallel scan using masscan.☆16Updated 4 years ago
- ☆10Updated 4 years ago
- A tool that adds reproducible UUIDs to YARA rules☆13Updated 6 months ago
- Serving files with conditions, serverside keying and more.☆18Updated 2 years ago
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆9Updated 2 years ago
- ☆17Updated last year
- pwncat windows c2 components☆17Updated 3 years ago
- ☆13Updated 3 years ago
- Ruby script to automate metasploit scanning, exploitation, and post-exploitation☆19Updated 4 years ago
- Mass Assigner is a simple tool made to probe for mass assignment vulnerability through JSON field modification in HTTP requests☆12Updated 4 months ago
- Simple C2 over the Trello API☆37Updated last year
- A python script file to statically and dynamically investigate and analyse binary files for buffer overflow exploits.☆10Updated 5 months ago
- A Python script to find tenant id an region from a list of domain names.☆12Updated last year
- A collection of tools adversaries commonly use in an attack.☆14Updated last month