CleasbyCode / pdvrdt
Steganography-Like CLI / Web tool for concealing files within PNG images.
☆10Updated this week
Alternatives and similar repositories for pdvrdt:
Users that are interested in pdvrdt are comparing it to the libraries listed below
- an easy interface for managing multiple linux & windows TCP reverse shells☆13Updated 2 weeks ago
- C++ Privilege Escalation Class to execute Process As Admin from User and Process as NT AUTHORITY SYSTEM from Admin☆19Updated last year
- This central repository is crafted for cybersecurity enthusiasts, researchers, and professionals aiming to advance their skills. It offer…☆14Updated 4 months ago
- Powershell implementation of a novel technique. Invoke-GPTObfuscation is a PowerShell Obfuscator that utilizes OpenAI (and other APIs) to…☆49Updated last year
- A script to automate keystrokes through a graphical desktop program.☆33Updated last month
- A tiny Windows hook library for x86/x64☆14Updated last year
- A C# Tool to gather information about email breaches☆13Updated last year
- Simple and efficient file shredding☆14Updated 5 years ago
- ARP Poisoning/Spoofing using Scapy Python Library☆11Updated last year
- OSINT Eye Mobile☆14Updated last month
- Database for custom made as well as publicly available stage-2 or beacons or stageless payloads, used by loaders/stage-1/stagers, or for …☆11Updated 3 weeks ago
- ☆17Updated 4 months ago
- A TikTok - Live Watcher application for tty / cli - for the unlikely situation when you live in tty, but want to watch TikTok Live.☆26Updated 5 months ago
- GrizzlyTunnel is a automation script designed to create seamless Layer 3 VPN like tunnels over SSH.☆23Updated 2 months ago
- Self replicating and automatically spreading SSH worm that recovers login credentials☆51Updated last year
- A python script to check if URLs are allowed or disallowed by a robots.txt file.☆21Updated 3 weeks ago
- MalBox is a quick and dirty setup to create a malware analysis VM☆13Updated 6 months ago
- Tool that can be used to trim useless things from a PE file such as the things a file pumper would add.☆25Updated 8 months ago
- Steganography-Like CLI / Web tool for concealing files within JPG images.☆44Updated this week
- x86_64 LKM linux rootkit☆16Updated last year
- SRE - Dissecting Malware for Static Analysis & the Complete Command-line Tool☆52Updated 2 months ago
- Inject shellcode into a valid BMP/GIF image.☆31Updated 4 years ago
- Phunter is an osint tool allowing you to find various information via a phone number 🔎📞☆15Updated 10 months ago
- SSH Private Key Looting Wordlists. A collection of wordlists to aid in locating or brute-forcing SSH private key file names.☆40Updated last year
- ☆15Updated 2 weeks ago
- A utility that can be used to launch an executable with a DLL injected☆18Updated last year
- Detailed explanation of Windows cryptographic algorithms, with examples and schemes.☆17Updated 3 months ago
- API hooking and code injection made easy!☆35Updated last year