CleasbyCode / pdvrdt
Steganography-Like CLI / Web tool for concealing files within PNG images.
☆8Updated last month
Alternatives and similar repositories for pdvrdt:
Users that are interested in pdvrdt are comparing it to the libraries listed below
- A C# Tool to gather information about email breaches☆13Updated last year
- This central repository is crafted for cybersecurity enthusiasts, researchers, and professionals aiming to advance their skills. It offer…☆14Updated 2 months ago
- GrizzlyTunnel is a automation script designed to create seamless Layer 3 VPN like tunnels over SSH.☆23Updated last month
- an easy interface for managing multiple linux & windows TCP reverse shells☆13Updated last week
- OSINT Eye Mobile☆11Updated this week
- A TikTok - Live Watcher application for tty / cli - for the unlikely situation when you live in tty, but want to watch TikTok Live.☆26Updated 4 months ago
- ☆17Updated 3 months ago
- An 💦 orgasmic 💦 Python library for the Docker Engine API 🥵☆13Updated last year
- ☆24Updated last year
- ST25TB / SRx NFC Emulator / Initiator - kameleon - based on TI TRF7970A with MSP430☆11Updated 5 months ago
- nTask is a distributed task management program that allows you to distribute tasks across multiple computers using API communication and …☆14Updated 2 weeks ago
- Powershell implementation of a novel technique. Invoke-GPTObfuscation is a PowerShell Obfuscator that utilizes OpenAI (and other APIs) to…☆51Updated last year
- A utility that can be used to launch an executable with a DLL injected☆19Updated last year
- Recursively extract urls from a web page for reconnaissance.☆12Updated 7 months ago
- Legba recipes.☆43Updated 5 months ago
- A PNG file-smuggling tool and library!☆24Updated last year
- Tool that can be used to trim useless things from a PE file such as the things a file pumper would add.☆25Updated 6 months ago
- This repository contains a Proof of Concept (PoC) exploit for CVE-2024-11680, a critical vulnerability in ProjectSend r1605 and older ver…☆13Updated last month
- Self replicating and automatically spreading SSH worm that recovers login credentials☆50Updated last year
- ZTE F660 Routers Authentication Bypass Leading to RCE.☆15Updated 11 months ago
- This search engine automates the discovery of sensitive information using customized dorks across GitHub, Google, and Shodan.☆11Updated 3 months ago
- How to retrive all information about Windows Extended Rights via LDAP☆10Updated 9 months ago
- TorrentSpyder is a command-line utility designed to retrieve Torrent Download History based on a specified IP address.☆10Updated 3 months ago
- bypassing the twitter safety link firewall :)☆12Updated 10 months ago
- Directory with Bluetooth exploits that is used in BlueToolkit☆10Updated 4 months ago
- A python script to check if URLs are allowed or disallowed by a robots.txt file.☆21Updated 2 years ago
- A utility to fetch and display dns names from the SSL/TLS cert data☆13Updated last year
- Enumerate SSN (System Service Numbers or Syscall ID) and syscall instruction address in ntdll module by parsing the PEB of the current pr…☆19Updated last year