CleasbyCode / pdvrdt
Steganography CLI & Web tool for concealing files within PNG images.
☆11Updated last week
Alternatives and similar repositories for pdvrdt:
Users that are interested in pdvrdt are comparing it to the libraries listed below
- This central repository is crafted for cybersecurity enthusiasts, researchers, and professionals aiming to advance their skills. It offer…☆14Updated 5 months ago
- an easy interface for managing multiple linux & windows TCP reverse shells☆13Updated 2 weeks ago
- An 💦 orgasmic 💦 Python library for the Docker Engine API 🥵☆13Updated last year
- ARP Poisoning/Spoofing using Scapy Python Library☆11Updated 2 years ago
- Rubber Ducky powered by NeoKey☆22Updated 10 months ago
- Tool to extract contents from the memory of Windows systems.☆14Updated last year
- Spoofing the Windows UAC "verified" publisher :)☆13Updated last year
- Self replicating and automatically spreading SSH worm that recovers login credentials☆52Updated last year
- A C# Tool to gather information about email breaches☆14Updated last year
- ☆16Updated 2 years ago
- Universal Tool Updater script☆24Updated 4 months ago
- Using a Telegram Chat to Act as a Command and Control Server with Powershell for Windows☆13Updated 10 months ago
- Steganography CLI & Web tool for concealing files within JPG images.☆44Updated this week
- Powershell Scripts for Blue Team members☆12Updated last year
- bypassing the twitter safety link firewall :)☆11Updated last year
- Encodes a message using emojis based on a specified pattern.☆16Updated last year
- Crack passwords with Hashcat using a Discord Bot.☆24Updated last year
- OSINT Eye Mobile☆14Updated 2 months ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆28Updated 3 years ago
- The Kill-The-Code Python Program provides a robust mechanism for remotely controlling code execution by monitoring a specified URL for a …☆16Updated 8 months ago
- Subdomain crawler with wordlist using python☆12Updated 5 years ago
- A utility that can be used to launch an executable with a DLL injected☆18Updated last year
- Legba recipes.☆49Updated 8 months ago
- AES-256 Microsoft Cryptography API Example Use.☆30Updated last year
- Recursively extract urls from a web page for reconnaissance.☆12Updated 10 months ago
- Terminal based fake identity generator.☆26Updated last year
- A tiny Windows hook library for x86/x64☆14Updated 2 years ago
- Collection of IDA helpers☆15Updated 2 years ago
- Directory with Bluetooth exploits that is used in BlueToolkit☆13Updated 2 months ago