CleasbyCode / pdvrdt
A data-hiding / steganography-like CLI tool for PNG images.
☆7Updated this week
Related projects ⓘ
Alternatives and complementary repositories for pdvrdt
- C++ Privilege Escalation Class to execute Process As Admin from User and Process as NT AUTHORITY SYSTEM from Admin☆18Updated last year
- Sources Codes of many MSIL malwares☆22Updated 2 years ago
- This central repository is crafted for cybersecurity enthusiasts, researchers, and professionals aiming to advance their skills. It offer…☆12Updated 2 weeks ago
- Recursively extract urls from a web page for reconnaissance.☆12Updated 5 months ago
- Collection of IDA helpers☆15Updated 2 years ago
- A C# Tool to gather information about email breaches☆12Updated 11 months ago
- Multi-threading wget golang☆12Updated 8 months ago
- How to retrive all information about Windows Extended Rights via LDAP☆10Updated 6 months ago
- ☆24Updated 10 months ago
- Maltego transform with Keskivonfer☆14Updated 4 years ago
- ☆16Updated last month
- AutoIt Obfuscator (Python module) lets you protect AutoIt script source code against analysis, reverse engineering, and decompilation usi…☆10Updated 9 months ago
- Multithreaded spraying of a password on all accounts of a domain.☆17Updated 4 months ago
- An 💦 orgasmic 💦 Python library for the Docker Engine API 🥵☆11Updated 10 months ago
- Build a Windows VM on VMWare ESXi, vCenter or vSphere from scratch 100% automated with Ansible.☆12Updated 3 months ago
- another pwndb tool with more options☆15Updated 3 years ago
- A utility that can be used to launch an executable with a DLL injected☆19Updated last year
- Chat GPT Things by Taylor Newsome☆12Updated 8 months ago
- An adaptation of timwhitez's proxycall that uses kernelbase.dll!Beep.☆11Updated last year
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆27Updated 2 years ago
- The IDOR IN works by systematically scanning a target web application and examining various endpoints, parameters, and data access points…☆10Updated last year
- Tool for obtaining information about PPL processes☆17Updated 9 months ago
- ZTE F660 Routers Authentication Bypass Leading to RCE.☆15Updated 9 months ago
- Multiple Password Generator - Unique Characters, Unique Sequences, Numbers, Uppercase, Lowercase, Symbols, Multiple Generator☆13Updated 6 years ago
- A tiny Windows hook library for x86/x64☆11Updated last year
- Subdomain crawler with wordlist using python☆12Updated 4 years ago
- The Proxy Auto Configuration (PAC) file dynamic generator which allows you to specify the proxying rules and the PAC-file will be generat…☆9Updated 4 years ago
- Highly customizable low-interaction experimental honeypot that mimics specific hosts.☆30Updated last week
- A tool which bypasses AMSI (AntiMalware Scan Interface) and PowerShell CLM (Constrained Language Mode) and gives you a FullLanguage Power…☆11Updated 9 months ago
- ☆10Updated 6 years ago