LCBOWER33 / StegoScanLinks
☆33Updated 4 months ago
Alternatives and similar repositories for StegoScan
Users that are interested in StegoScan are comparing it to the libraries listed below
Sorting:
- RADAR (Rapid Assessment of DNS And Reconnaissance) is an advanced DNS reconnaissance tool designed to identify technologies and services …☆103Updated 6 months ago
- Laravel RCE Exploitation Toolkit☆46Updated 3 weeks ago
- 🤖 The Modern, Blazing Fast Port Scanner 🤖☆28Updated 9 months ago
- ☆65Updated last year
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆44Updated last year
- ☆127Updated 4 months ago
- Inboxfuscation is an advanced offensive & defensive framework for mailbox rule obfuscation and detection in Exchange environments.☆79Updated last month
- Infiltrax is a post-exploitation reconnaissance tool for penetration testers and red teams, designed to capture screenshots, retrieve cli…☆79Updated last year
- Swiss Army Knife for payload encryption, obfuscation, and conversion to byte arrays – all in a single command (14 output formats supporte…☆177Updated last month
- specialized investigative framework to investigate cases of malicious actors in the OSINT and backup dark forums.☆63Updated 2 months ago
- Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's …☆126Updated 7 months ago
- An AI-driven vulnerability scanner that uses Nmap to discover open services on a user-supplied IP, matches each service to relevant CVEs …☆47Updated 4 months ago
- This Python script checks for the CVE-2024-6387 vulnerability in OpenSSH servers. It supports multiple IP addresses, URLs, CIDR ranges, a…☆98Updated last year
- The tool that bypasses the firewall's Application Based Rules and lets you connect to anywhere, ANY IP, ANY PORT and ANY APPLICATION.☆61Updated last year
- SprayShark is a modular G-Suite password sprayer with threading!☆52Updated 5 months ago
- ☆71Updated 9 months ago
- Auto exploitation tool for CVE-2024-24401.☆36Updated last year
- Kooky cURL-powered replacement for reverse shell via /dev/tcp☆71Updated this week
- Linux post exploitation tool for info gathering and exfiltration 🐧📡💀☆86Updated 3 months ago
- A fast Go-based tool to uncover sensitive information in JavaScript☆34Updated 3 months ago
- I-Espresso is a tool that enables users to generate Portable Executable (PE) files from batch scripts. Leveraging IExpress, it demonstrat…☆85Updated last year
- A command-line utility for performing reverse DNS lookups☆74Updated 2 years ago
- Analyze Android native `.so` files☆85Updated 3 months ago
- External recon toolkit☆53Updated 9 months ago
- Admin Directory Finder is a tool designed to scan and identify directories under admin paths, such as admin/dashboard.php. It helps in se…☆33Updated last month
- The SAP Threat Modeling Tool is an on-premises open-source web application designed to analyze and visualize connections between SAP syst…☆49Updated 7 months ago
- A Moodle Scanner☆43Updated 11 months ago
- specialized investigative framework to investigate cases of malicious actors in the OSINT and backup LeakBase☆60Updated 2 months ago
- Physical penetration testing is a critical aspect of security assessment that involves simulating real-world attacks to evaluate the effe…☆82Updated 6 months ago
- SubCerts is a simple tool that uses certificate transparency logs (via crt.sh) to extract subdomains of a given domain.☆74Updated 3 months ago