Paradoxis / StegCrackerLinks
Steganography brute-force utility to uncover hidden data inside files
☆576Updated 4 years ago
Alternatives and similar repositories for StegCracker
Users that are interested in StegCracker are comparing it to the libraries listed below
Sorting:
- Yet another Stego Tool☆389Updated 2 years ago
- Fetch, install and search wordlist archives from websites and torrent peers.☆518Updated last year
- A set of security related tools☆670Updated 4 years ago
- Useful CTF Tools☆282Updated 3 years ago
- dirbuster-ng is C CLI implementation of the Java dirbuster tool☆354Updated 5 years ago
- Execute a brute force attack with Steghide to file with hide information and password established☆119Updated 4 years ago
- Writeups for infosec Capture the Flag events by team Galaxians☆429Updated 2 years ago
- Least Significant Bit Steganography for bitmap images (.bmp and .png), WAV sound files, and byte sequences. Simple LSB Steganalysis (LSB …☆631Updated 11 months ago
- Automated script for performing Padding Oracle attacks☆793Updated last year
- ReverShellGenerator - A tool to generate various ways to do a reverse shell☆566Updated last year
- PacketWhisper: Stealthily exfiltrate data and defeat attribution using DNS queries and text-based steganography. Avoid the problems assoc…☆645Updated 4 years ago
- Search gtfobins and lolbas files from your terminal☆462Updated 3 years ago
- 🙃 Reverse Shell Cheat Sheet 🙃☆441Updated 5 years ago
- A collection of Windows, Linux and MySQL privilege escalation scripts and exploits.☆977Updated 7 years ago
- fimap is a little python tool which can find, prepare, audit, exploit and even google automatically for local and remote file inclusion b…☆561Updated 3 years ago
- Software to identify the different types of hashes used to encrypt data and especially passwords☆612Updated last year
- Various webshells. We accept pull requests for additions to this collection.☆975Updated last year
- Python PTY backdoors - full PTY or nothing!☆751Updated 11 years ago
- Shellshock exploit + vulnerable environment☆218Updated 2 years ago
- Custom Tools and Notes from my own Penetration Testing Experience☆281Updated last year
- Worlds fastest steghide cracker, chewing through millions of passwords per second☆1,177Updated last year
- Use unicornscan to quickly scan all open ports, and then pass the open ports to nmap for detailed scans.☆632Updated 7 years ago
- detect stegano-hidden data in PNG & BMP☆1,463Updated last month
- offsec batteries included☆1,579Updated last year
- Automatically exported from code.google.com/p/unix-privesc-check☆1,071Updated 4 years ago
- Hashcat Cheatsheet for OSCP☆622Updated 5 years ago
- A lightweight, portable, and modular tool for Linux enumeration and privilege escalation.☆287Updated 7 months ago
- Vulnerable server used for learning software exploitation☆1,072Updated 4 years ago
- A standalone python script which utilizes python's built-in modules to enumerate SUID binaries, separate default binaries from custom bin…☆635Updated last month
- enum4Linux is a Linux alternative to enum.exe for enumerating data from Windows and Samba hosts☆1,326Updated 4 months ago