CleasbyCode / pdvrdtLinks
pdvrdt is a metadata “steganography-like” command-line and web tool used for concealing and extracting any file type within and from a PNG image.
☆13Updated this week
Alternatives and similar repositories for pdvrdt
Users that are interested in pdvrdt are comparing it to the libraries listed below
Sorting:
- Rubber Ducky powered by NeoKey☆27Updated last year
- an easy interface for managing multiple linux & windows TCP reverse shells☆15Updated 5 months ago
- Visualize BBOT scans in realtime with VivaGraphJS☆54Updated 10 months ago
- jdvrif is a metadata “steganography-like” command-line and web tool used for concealing and extracting any file type within and from a JP…☆53Updated this week
- A C# Tool to gather information about email breaches☆15Updated last year
- Self replicating and automatically spreading SSH worm that recovers login credentials☆54Updated 2 years ago
- Some security by obscurity using port-jumping.☆14Updated last month
- ExeSpy is a cross-platform PE viewer for EXE and DLL files☆69Updated 7 months ago
- Tool that can be used to trim useless things from a PE file such as the things a file pumper would add.☆27Updated 5 months ago
- hiding in plain sight: part 2☆45Updated last year
- GitHub CVE Repository Hunt☆19Updated last year
- Multiplatform Telegram Bot in pure PowerShell☆53Updated 2 years ago
- A rigorous IoT scanner based on Shodan.io☆61Updated 8 months ago
- ☆19Updated 3 years ago
- Yandex browser password recovery☆11Updated 5 months ago
- Chat GPT Things by Taylor Newsome☆12Updated last year
- The script uses an Google maps API to download photos of places in the area specified by coordinates and search radius☆21Updated last year
- Tool to extract contents from the memory of Windows systems.☆14Updated 2 years ago
- multiduplicut : optimize wordlists-based password cracking methods chaining☆16Updated 3 years ago
- A malicious keyboard that delivers a multi-staged attack, consisting of a trojan payload which can bypass antivirus, with Windows machine…☆15Updated 5 months ago
- SSH Private Key Looting Wordlists. A collection of wordlists to aid in locating or brute-forcing SSH private key file names.☆42Updated last year
- An 💦 orgasmic 💦 Python library for the Docker Engine API 🥵☆13Updated last year
- Hides message with invisible Unicode characters☆94Updated 11 months ago
- Receive email alerts on successful ssh logins based on a predefined IP whitelist OR a predefined IP country origin whitelist (using mailg…☆25Updated last year
- A utility to fetch and display dns names from the SSL/TLS cert data☆14Updated 2 years ago
- Effortlessly browse and manage your files with ease using Tiny File Manager [WH1Z-Edition], a compact single-file PHP file manager.☆24Updated last year
- ☆16Updated 4 months ago
- Monitor 802.11 probe requests from a capture file or network sniffing!☆32Updated 7 months ago
- This module exploits a vulnerability in WinRAR (CVE-2023-38831). When a user opens a crafted RAR file and its embedded document, a script…☆14Updated 2 years ago
- CLI / Web Tool for Creating Tweetable PNG-ZIP and PNG-JAR Polyglot Image Files.☆37Updated 3 weeks ago