Paradoxis / StegCrackerLinks
Steganography brute-force utility to uncover hidden data inside files
☆586Updated 5 years ago
Alternatives and similar repositories for StegCracker
Users that are interested in StegCracker are comparing it to the libraries listed below
Sorting:
- Fetch, install and search wordlist archives from websites and torrent peers.☆530Updated last year
- Yet another Stego Tool☆400Updated 2 years ago
- Useful CTF Tools☆285Updated 3 years ago
- dirbuster-ng is C CLI implementation of the Java dirbuster tool☆353Updated 5 years ago
- A set of security related tools☆685Updated 4 years ago
- Software to identify the different types of hashes used to encrypt data and especially passwords☆626Updated last year
- PacketWhisper: Stealthily exfiltrate data and defeat attribution using DNS queries and text-based steganography. Avoid the problems assoc…☆647Updated 4 years ago
- Search gtfobins and lolbas files from your terminal☆461Updated 3 years ago
- ReverShellGenerator - A tool to generate various ways to do a reverse shell☆567Updated last year
- Pop shells like a master.☆1,485Updated 6 years ago
- Automated script for performing Padding Oracle attacks☆801Updated last year
- A collection of Windows, Linux and MySQL privilege escalation scripts and exploits.☆981Updated 8 years ago
- Automatically exported from code.google.com/p/unix-privesc-check☆1,082Updated 4 years ago
- Gives you one-liners that aids in penetration testing operations, privilege escalation and more☆1,744Updated last month
- Various webshells. We accept pull requests for additions to this collection.☆1,001Updated 2 years ago
- A framework for layer 2 attacks☆824Updated 2 years ago
- DotDotPwn - The Directory Traversal Fuzzer☆1,103Updated 3 years ago
- Shellshock exploit + vulnerable environment☆227Updated 2 years ago
- Python PTY backdoors - full PTY or nothing!☆749Updated 11 years ago
- Execute a brute force attack with Steghide to file with hide information and password established☆121Updated 5 years ago
- Custom Tools and Notes from my own Penetration Testing Experience☆283Updated 2 years ago
- Tools, scripts and tips useful during Penetration Testing engagements.☆635Updated last month
- fimap is a little python tool which can find, prepare, audit, exploit and even google automatically for local and remote file inclusion b…☆577Updated 3 years ago
- Use unicornscan to quickly scan all open ports, and then pass the open ports to nmap for detailed scans.☆628Updated 7 years ago
- A lightweight, portable, and modular tool for Linux enumeration and privilege escalation.☆290Updated 2 weeks ago
- My collection of various security tools created mostly in Python and Bash. For CTFs and Bug Bounty.☆907Updated 3 months ago
- A standalone python script which utilizes python's built-in modules to enumerate SUID binaries, separate default binaries from custom bin…☆647Updated 5 months ago
- Least Significant Bit Steganography for bitmap images (.bmp and .png), WAV sound files, and byte sequences. Simple LSB Steganalysis (LSB …☆638Updated 3 months ago
- Worlds fastest steghide cracker, chewing through millions of passwords per second☆1,223Updated 2 years ago
- Writeups for infosec Capture the Flag events by team Galaxians☆435Updated 2 years ago