XlogicX / Explosive-Steganography
Explosive Steganography tools and presentation (as given at the HOPE number 9 conference)
☆21Updated 10 years ago
Alternatives and similar repositories for Explosive-Steganography:
Users that are interested in Explosive-Steganography are comparing it to the libraries listed below
- An Intentionally Vulnerable Router Firmware Distribution☆64Updated 9 years ago
- A web spider's worst nightmare.☆52Updated 12 years ago
- Offensives network security framework for Wireless and MiTM style hacking☆60Updated 7 years ago
- Reverse Engineering and Exploit Development stuff☆31Updated 6 years ago
- An automated script that download potential exploit for linux kernel from exploitdb, and compile them automatically☆25Updated 8 years ago
- Data Exfiltration and Command Execution via AAAA Records☆67Updated 8 years ago
- Uses Shodan to locate HackingTeam C&C Servers.☆78Updated 9 years ago
- A Windows priviledge escalation tool (abusing race conditions)☆79Updated 9 years ago
- proof of concept to backdoor files from owncloud encryption module☆18Updated 8 years ago
- Tools for MITMing Yahoo! Mail with a Wifi Pineapple Mark V and Flash☆28Updated 8 years ago
- Nacker is a tool to circumvent 802.1x Network Access Control (NAC) on a wired LAN. Nacker will help you locate any non-802.1x configurabl…☆105Updated 10 years ago
- SensePost's network footprinting and enumeration tool. You can't pwn what you don't know about.☆43Updated 10 years ago
- Scripts that aren't PowerShell☆48Updated 5 years ago
- Rogue AP killer☆89Updated 7 years ago
- Python malware for pentesters that bypasses most antivirus (signature and heuristics) and IPS using sheer stupidity☆76Updated 10 years ago
- Source code to the Malicious Demon Hunter Exploit Kit☆57Updated 9 years ago
- Fetch, install and search exploit archives from exploit sites.☆111Updated last year
- Database of private SSL/SSH keys for embedded devices☆255Updated 11 months ago
- ☆42Updated 10 years ago
- unix wildcard attacks☆132Updated 6 years ago
- Monitoring 'DNS' inside the Tor network☆92Updated 8 years ago
- The Dirty Secrets They Didn't Teach You In Pentesting Class☆96Updated 12 years ago
- YAML data sources for metasploit.github.io☆20Updated 8 years ago
- Babel Scripting Framework☆42Updated 4 years ago
- IRON-HID: Create Your Own Bad USB Device (Presented at HITBSecConf 2016)☆59Updated 6 years ago
- Holepuncher, A wrapper script to open ports in iptables and start a listener.☆32Updated 8 years ago
- Security tools to use on assessments.☆39Updated 8 years ago
- ☆32Updated 10 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Updated 8 years ago
- Android wireless karma attack detector☆66Updated 9 years ago