Paradoxis / StegCrackerLinks
Steganography brute-force utility to uncover hidden data inside files
☆577Updated 4 years ago
Alternatives and similar repositories for StegCracker
Users that are interested in StegCracker are comparing it to the libraries listed below
Sorting:
- Yet another Stego Tool☆394Updated 2 years ago
- Fetch, install and search wordlist archives from websites and torrent peers.☆520Updated last year
- Useful CTF Tools☆283Updated 3 years ago
- A set of security related tools☆675Updated 4 years ago
- ReverShellGenerator - A tool to generate various ways to do a reverse shell☆567Updated last year
- PacketWhisper: Stealthily exfiltrate data and defeat attribution using DNS queries and text-based steganography. Avoid the problems assoc…☆645Updated 4 years ago
- fimap is a little python tool which can find, prepare, audit, exploit and even google automatically for local and remote file inclusion b…☆562Updated 3 years ago
- A standalone python script which utilizes python's built-in modules to enumerate SUID binaries, separate default binaries from custom bin…☆637Updated 2 months ago
- A collection of Windows, Linux and MySQL privilege escalation scripts and exploits.☆973Updated 7 years ago
- Search gtfobins and lolbas files from your terminal☆461Updated 3 years ago
- Python PTY backdoors - full PTY or nothing!☆749Updated 11 years ago
- dirbuster-ng is C CLI implementation of the Java dirbuster tool☆353Updated 5 years ago
- Worlds fastest steghide cracker, chewing through millions of passwords per second☆1,187Updated 2 years ago
- Automated script for performing Padding Oracle attacks☆796Updated last year
- A lightweight, portable, and modular tool for Linux enumeration and privilege escalation.☆288Updated 8 months ago
- Pop shells like a master.☆1,472Updated 6 years ago
- Writeups for infosec Capture the Flag events by team Galaxians☆430Updated 2 years ago
- Shellshock exploit + vulnerable environment☆218Updated 2 years ago
- Software to identify the different types of hashes used to encrypt data and especially passwords☆615Updated last year
- Least Significant Bit Steganography for bitmap images (.bmp and .png), WAV sound files, and byte sequences. Simple LSB Steganalysis (LSB …☆632Updated last week
- enum4Linux is a Linux alternative to enum.exe for enumerating data from Windows and Samba hosts☆1,335Updated 5 months ago
- Custom Tools and Notes from my own Penetration Testing Experience☆281Updated last year
- Execute a brute force attack with Steghide to file with hide information and password established☆120Updated 5 years ago
- Automatically exported from code.google.com/p/unix-privesc-check☆1,069Updated 4 years ago
- ☆1,170Updated 8 years ago
- Steal Net-NTLM Hash using Bad-PDF☆1,126Updated 5 years ago
- An automated, modular cryptanalysis tool; i.e., a Weapon of Math Destruction☆1,112Updated 3 years ago
- Some of the best web shells that you might need!☆344Updated 2 years ago
- Internal penetration testing tool for Linux that can be used to enumerate OS information, domain information, shares, directories, and us…☆576Updated last year
- Use unicornscan to quickly scan all open ports, and then pass the open ports to nmap for detailed scans.☆632Updated 7 years ago