Paradoxis / StegCrackerLinks
Steganography brute-force utility to uncover hidden data inside files
☆588Updated 5 years ago
Alternatives and similar repositories for StegCracker
Users that are interested in StegCracker are comparing it to the libraries listed below
Sorting:
- Yet another Stego Tool☆401Updated 2 years ago
- Fetch, install and search wordlist archives from websites and torrent peers.☆532Updated last year
- PacketWhisper: Stealthily exfiltrate data and defeat attribution using DNS queries and text-based steganography. Avoid the problems assoc…☆649Updated 4 years ago
- A collection of Windows, Linux and MySQL privilege escalation scripts and exploits.☆981Updated 8 years ago
- A set of security related tools☆685Updated 4 years ago
- Useful CTF Tools☆286Updated 3 years ago
- dirbuster-ng is C CLI implementation of the Java dirbuster tool☆354Updated 5 years ago
- Mentalist is a graphical tool for custom wordlist generation. It utilizes common human paradigms for constructing passwords and can outpu…☆1,950Updated 2 months ago
- Least Significant Bit Steganography for bitmap images (.bmp and .png), WAV sound files, and byte sequences. Simple LSB Steganalysis (LSB …☆643Updated 4 months ago
- ReverShellGenerator - A tool to generate various ways to do a reverse shell☆567Updated last year
- Search gtfobins and lolbas files from your terminal☆462Updated 3 years ago
- Worlds fastest steghide cracker, chewing through millions of passwords per second☆1,235Updated 2 years ago
- Automatically exported from code.google.com/p/unix-privesc-check☆1,084Updated 5 years ago
- A standalone python script which utilizes python's built-in modules to enumerate SUID binaries, separate default binaries from custom bin…☆650Updated 6 months ago
- Automated script for performing Padding Oracle attacks☆804Updated last year
- A lightweight, portable, and modular tool for Linux enumeration and privilege escalation.☆292Updated last month
- Bull's Eye Wordlist Generator - Does your password rely on predictable patterns of accessible info?☆418Updated 4 years ago
- offsec batteries included☆1,593Updated last year
- Various webshells. We accept pull requests for additions to this collection.☆1,009Updated 2 years ago
- Custom Tools and Notes from my own Penetration Testing Experience☆283Updated 2 years ago
- A framework for layer 2 attacks☆830Updated 2 years ago
- Execute a brute force attack with Steghide to file with hide information and password established☆121Updated 5 years ago
- One rule to crack all passwords. or atleast we hope so.☆1,598Updated 4 years ago
- Writeups for infosec Capture the Flag events by team Galaxians☆434Updated 2 years ago
- fimap is a little python tool which can find, prepare, audit, exploit and even google automatically for local and remote file inclusion b…☆581Updated 3 years ago
- Use unicornscan to quickly scan all open ports, and then pass the open ports to nmap for detailed scans.☆628Updated 7 years ago
- This is my cheatsheet and scripts developed while taking the Offensive Security Penetration Testing with Kali Linux course.☆485Updated 4 years ago
- Python PTY backdoors - full PTY or nothing!☆751Updated 11 years ago
- Software to identify the different types of hashes used to encrypt data and especially passwords☆631Updated last year
- DotDotPwn - The Directory Traversal Fuzzer☆1,105Updated 3 years ago