Cyber-Courses / DNSCat-PNG-ExtractorLinks
DNSCat PNG Extractor is a Python tool designed for the extraction of PNG image data from DNS exfiltration attempts using DNScat
☆10Updated 2 years ago
Alternatives and similar repositories for DNSCat-PNG-Extractor
Users that are interested in DNSCat-PNG-Extractor are comparing it to the libraries listed below
Sorting:
- Orange Cyberdefense mindmaps☆1,484Updated 8 months ago
- A customizable and powerful penetration testing reporting platform for offensive security professionals. Simplify, customize, and automat…☆2,224Updated last week
- 👋 Welcome to the Cyber Library your ultimate resource for everything cybersecurity.☆27Updated last week
- These are the checklists I used during each phase of my CPTS Exam.☆43Updated 5 months ago
- Labs for Practical Malware Analysis & Triage☆1,041Updated 7 months ago
- Active Directory and Internal Pentest Cheatsheets☆1,870Updated last week
- This map lists the essential techniques to bypass anti-virus and EDR☆2,948Updated 7 months ago
- linWinPwn is a bash script that streamlines the use of a number of Active Directory tools☆2,108Updated last week
- Pentesting cheatsheet with all the commands I learned during my learning journey. Will try to to keep it up-to-date.☆1,485Updated this week
- ☆690Updated last year
- Exploitation paths allowing you to (mis)use the Windows Privileges to elevate your rights within the OS.☆2,335Updated 2 years ago
- Create a vulnerable active directory that's allowing you to test most of the active directory attacks in a local lab☆2,222Updated last year
- Windows Local Privilege Escalation Cookbook☆1,210Updated 10 months ago
- Penelope Shell Handler☆1,249Updated this week
- https://academy.tcm-sec.com/☆151Updated 5 months ago
- Extract NFS files from wireshark capture (pcap)☆22Updated last year
- Pentest Report Generator☆2,682Updated 2 weeks ago
- OSCP Cheatsheet by Sai Sathvik☆1,122Updated last year
- A resource containing all the tools each ransomware gangs uses☆1,280Updated last month
- Arsenal is just a quick inventory and launcher for hacking programs☆3,611Updated 11 months ago
- A collection of techniques, examples and a little bit of theory for manually obfuscating PowerShell scripts to achieve AV evasion, compil…☆1,115Updated last year
- An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.☆4,052Updated 5 months ago
- WADComs is an interactive cheat sheet, containing a curated list of offensive security tools and their respective commands, to be used ag…☆1,616Updated 2 months ago
- game of active directory☆7,141Updated 4 months ago
- a tool for pentesters to help find delicious candy, by @l0ss and @Sh3r4 ( Twitter: @/mikeloss and @/sh3r4_hax )☆2,618Updated last month
- Useful Techniques, Tactics, and Procedures for red teamers and defenders, alike!☆1,820Updated last week
- eJPT is a hands-on, entry-level Red Team certification that simulates skills utilized during real-world engagements.☆21Updated last year
- ☆51Updated 2 years ago
- A collection of awesome Command & Control (C2) frameworks, tools and resources for post-exploitation and red teaming assignments.☆923Updated 4 years ago
- The Network Execution Tool☆4,935Updated this week