XlogicX / Explosive-SteganographyLinks
Explosive Steganography tools and presentation (as given at the HOPE number 9 conference)
☆20Updated 12 years ago
Alternatives and similar repositories for Explosive-Steganography
Users that are interested in Explosive-Steganography are comparing it to the libraries listed below
Sorting:
- Uses Shodan to locate HackingTeam C&C Servers.☆79Updated 10 years ago
- Database of private SSL/SSH keys for embedded devices☆269Updated 2 years ago
- Python malware for pentesters that bypasses most antivirus (signature and heuristics) and IPS using sheer stupidity☆76Updated 11 years ago
- ☆147Updated 9 years ago
- for the louise☆245Updated 5 years ago
- An Intentionally Vulnerable Router Firmware Distribution☆64Updated 10 years ago
- Kojoney2 is a low interaction SSH honeypot written in Python. Based on Kojoney by Jose Antonio Coret☆39Updated 11 years ago
- YAML data sources for metasploit.github.io☆20Updated 9 years ago
- Monitoring 'DNS' inside the Tor network☆93Updated 9 years ago
- An automated script that download potential exploit for linux kernel from exploitdb, and compile them automatically☆25Updated 9 years ago
- HORSEPILL rootkit PoC☆233Updated 9 years ago
- Automated password cracking with AWS GPU instances and CUDA hashcat☆51Updated 10 years ago
- Because I can't find scripts to do this anywhere else...☆26Updated 9 years ago
- A rogue-USB-device defeat program for Windows.☆189Updated 3 years ago
- An experimental implementation of a bot client which interprets commands through Twitter, thus requiring no hosting of servers from the c…☆43Updated 10 years ago
- Small tool for disassembling shellcode (using objdump)☆149Updated 3 years ago
- A honeypot for malware that propagates via USB storage devices☆102Updated 10 years ago
- Cryptowall Tooling & Information☆37Updated 9 years ago
- A collection of post-exploitation tools for network red teaming.☆139Updated 7 years ago
- Unveiled at DEF CON 20, NTLM Relaying to ALL THE THINGS!☆261Updated 9 years ago
- Attack Knowledge Base☆101Updated 8 years ago
- ☆128Updated 10 years ago
- A collection of tools for dealing with TrickBot☆203Updated 8 years ago
- General tools and scripts i want to make public to the world.☆46Updated 6 years ago
- Automated memory forensics analysis☆32Updated 6 years ago
- An 802.11 WEP/WPA2 on-the-fly decrypter.☆141Updated 3 years ago
- ☆111Updated 8 years ago
- Panic button for protection against cold boot attacks☆146Updated 4 years ago
- ☆166Updated 8 years ago
- Rapid deployment of Windows environment (files, registry keys, mutex etc) to facilitate malware analysis☆40Updated 10 years ago