Paradoxis / StegCrackerLinks
Steganography brute-force utility to uncover hidden data inside files
☆577Updated 4 years ago
Alternatives and similar repositories for StegCracker
Users that are interested in StegCracker are comparing it to the libraries listed below
Sorting:
- Yet another Stego Tool☆389Updated 2 years ago
- Fetch, install and search wordlist archives from websites and torrent peers.☆517Updated last year
- Useful CTF Tools☆281Updated 3 years ago
- A set of security related tools☆669Updated 4 years ago
- A collection of Windows, Linux and MySQL privilege escalation scripts and exploits.☆979Updated 7 years ago
- ReverShellGenerator - A tool to generate various ways to do a reverse shell☆566Updated last year
- dirbuster-ng is C CLI implementation of the Java dirbuster tool☆354Updated 5 years ago
- Least Significant Bit Steganography for bitmap images (.bmp and .png), WAV sound files, and byte sequences. Simple LSB Steganalysis (LSB …☆628Updated 10 months ago
- PacketWhisper: Stealthily exfiltrate data and defeat attribution using DNS queries and text-based steganography. Avoid the problems assoc…☆644Updated 4 years ago
- Pop shells like a master.☆1,472Updated 6 years ago
- Writeups for infosec Capture the Flag events by team Galaxians☆428Updated 2 years ago
- Search gtfobins and lolbas files from your terminal☆463Updated 3 years ago
- Python PTY backdoors - full PTY or nothing!☆749Updated 11 years ago
- Execute a brute force attack with Steghide to file with hide information and password established☆119Updated 4 years ago
- fimap is a little python tool which can find, prepare, audit, exploit and even google automatically for local and remote file inclusion b…☆558Updated 2 years ago
- Automated script for performing Padding Oracle attacks☆790Updated last year
- Automatically exported from code.google.com/p/unix-privesc-check☆1,067Updated 4 years ago
- offsec batteries included☆1,575Updated last year
- A tool for automating cracking methodologies through Hashcat from the TrustedSec team.☆1,752Updated 6 months ago
- Use unicornscan to quickly scan all open ports, and then pass the open ports to nmap for detailed scans.☆633Updated 7 years ago
- Standalone Executable to Check for Simple Privilege Escalation Vectors on Windows Systems☆1,508Updated 2 years ago
- Various webshells. We accept pull requests for additions to this collection.☆972Updated last year
- Tools, scripts and tips useful during Penetration Testing engagements.☆634Updated last month
- Shellshock exploit + vulnerable environment☆216Updated 2 years ago
- Detect hidden files and text in images☆121Updated 2 years ago
- 🙃 Reverse Shell Cheat Sheet 🙃☆441Updated 5 years ago
- A framework for layer 2 attacks☆791Updated last year
- Collection of Proof of Concepts and Potential Targets for #ShellShocker☆888Updated 5 years ago
- Micro$oft Windows Hacking Pack☆523Updated 7 years ago
- A lightweight, portable, and modular tool for Linux enumeration and privilege escalation.☆287Updated 6 months ago