Paradoxis / StegCracker
Steganography brute-force utility to uncover hidden data inside files
☆548Updated 3 years ago
Related projects: ⓘ
- Yet another Stego Tool☆348Updated last year
- Worlds fastest steghide cracker, chewing through millions of passwords per second☆986Updated 11 months ago
- PacketWhisper: Stealthily exfiltrate data and defeat attribution using DNS queries and text-based steganography. Avoid the problems assoc…☆620Updated 3 years ago
- Totally Automatic LFI Exploiter (+ Reverse Shell) and Scanner☆1,664Updated 2 years ago
- ReverShellGenerator - A tool to generate various ways to do a reverse shell☆554Updated 4 months ago
- A standalone python script which utilizes python's built-in modules to enumerate SUID binaries, separate default binaries from custom bin…☆615Updated 3 years ago
- Fetch, install and search wordlist archives from websites and torrent peers.☆489Updated 5 months ago
- offsec batteries included☆1,492Updated 6 months ago
- A collection of Windows, Linux and MySQL privilege escalation scripts and exploits.☆956Updated 6 years ago
- A set of security related tools☆642Updated 3 years ago
- A tool for automating cracking methodologies through Hashcat from the TrustedSec team.☆1,630Updated last week
- fimap is a little python tool which can find, prepare, audit, exploit and even google automatically for local and remote file inclusion b…☆512Updated 2 years ago
- Gives you one-liners that aids in penetration testing operations, privilege escalation and more☆1,657Updated 2 years ago
- pwning IPv4 via IPv6☆1,675Updated 7 months ago
- Notes for taking the OSCP in 2097. Read in book form on GitBook☆617Updated 6 years ago
- Use unicornscan to quickly scan all open ports, and then pass the open ports to nmap for detailed scans.☆628Updated 6 years ago
- detect stegano-hidden data in PNG & BMP☆1,269Updated 5 months ago
- DotDotPwn - The Directory Traversal Fuzzer☆973Updated last year
- Vulnerable server used for learning software exploitation☆988Updated 3 years ago
- A security tool for multithreaded information gathering and service enumeration whilst building directory structures to store results, al…☆2,102Updated last year
- Compilation of commands, tips and scripts that helped me throughout Vulnhub, Hackthebox, OSCP and real scenarios☆1,317Updated last year
- CeWL is a Custom Word List Generator☆1,910Updated 3 weeks ago
- ☆1,094Updated 7 years ago
- Useful CTF Tools☆269Updated 2 years ago
- Standalone Executable to Check for Simple Privilege Escalation Vectors on Windows Systems☆1,479Updated last year
- Search gtfobins and lolbas files from your terminal☆455Updated 2 years ago
- Local file inclusion exploitation tool☆767Updated last year
- Writeups for infosec Capture the Flag events by team Galaxians☆424Updated last year
- Collection of steganography tools - helps with CTF challenges☆2,369Updated last year
- Automatically exported from code.google.com/p/unix-privesc-check☆1,024Updated 3 years ago