Charmve / PyStegosploitLinks
PoC - Exploit Delivery via Steganography and Polyglots, CVE-2014-0282
☆51Updated last year
Alternatives and similar repositories for PyStegosploit
Users that are interested in PyStegosploit are comparing it to the libraries listed below
Sorting:
- Apache Tomcat Manager API WAR Shell Upload☆35Updated 5 years ago
- Simple script to bulk check if IPs match networks☆12Updated 3 years ago
- Extendable Python script handler for automating penetration testing.☆39Updated 2 years ago
- Bifrost C2. Open-source post-exploitation using Discord API☆49Updated 3 years ago
- Interactive shell to execute commands anonymously using Proxychains and Tor☆42Updated 2 years ago
- A reverse TCP payload and listener both written in python3.☆30Updated last year
- Ded Security Framework is a tool aimed at security professionals☆35Updated last year
- Secure destruction of sensitive virtual data, temporary files and swap partitions☆78Updated 2 years ago
- PHP lab to test captcha bypassing☆31Updated last year
- WebHook for Red Team☆26Updated 4 years ago
- "Ghost (RAT)" -> Reverse shell and management console for Windows☆18Updated 3 years ago
- Enumeration & fingerprint tool☆25Updated last year
- Browser-based QRLJacking tool written in pure JavaScript. For educational use only.☆18Updated 10 months ago
- A lightweight ducky script generator written in python.☆30Updated 4 years ago
- Miscellaneous tools for BloodHound☆17Updated 3 years ago
- Pandora is an simple undetectable open-source virus composed of agents, servers and masters. Can be used under Windows & Linux.☆62Updated 3 years ago
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 2 years ago
- A new and improved DeadTrap with more efficient time span for scanning a number☆29Updated 4 years ago
- A CRYPTOJACKING PROGRAM (MALWARE) >:)☆30Updated 3 years ago
- A OSINT tool to obtain a target's phone number just by having his email address☆30Updated 5 years ago
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆34Updated 3 years ago
- Full Valid Fake Data Generator☆99Updated 9 months ago
- Proof of concept denial of service over TOR stress test tool☆41Updated 6 years ago
- Generate Undetectable Metasploit Payload in a simple way☆39Updated last year
- Red Teaming Tactics and Techniques☆14Updated 3 years ago
- C2 framework with modular and extensible architecture, task scheduler, remote shell live sessions and a retro look-feeling interface whic…☆42Updated 2 years ago
- Github repository with Write Up, AutoPwn, Tools, Videos of CTF's from HackTheBox and TryHackMe☆18Updated 2 years ago
- A tool designed to analyse email headers☆35Updated 2 years ago
- A Hacking and Pentesting Tool for Windows☆20Updated 4 months ago
- A windows post exploitation tool that contains a lot of features for information gathering and more.☆47Updated 4 years ago