XlogicX / Explosive-SteganographyLinks
Explosive Steganography tools and presentation (as given at the HOPE number 9 conference)
☆20Updated 11 years ago
Alternatives and similar repositories for Explosive-Steganography
Users that are interested in Explosive-Steganography are comparing it to the libraries listed below
Sorting:
- for the louise☆245Updated 5 years ago
- Database of private SSL/SSH keys for embedded devices☆268Updated last year
- Uses Shodan to locate HackingTeam C&C Servers.☆79Updated 10 years ago
- An Intentionally Vulnerable Router Firmware Distribution☆64Updated 10 years ago
- Python malware for pentesters that bypasses most antivirus (signature and heuristics) and IPS using sheer stupidity☆76Updated 11 years ago
- A rogue-USB-device defeat program for Windows.☆189Updated 3 years ago
- pastebin.com Content Monitoring Tool☆194Updated 13 years ago
- AM radio data exfiltration with CPU cache in assembly☆19Updated 2 years ago
- Offensives network security framework for Wireless and MiTM style hacking☆61Updated 8 years ago
- Rapid deployment of Windows environment (files, registry keys, mutex etc) to facilitate malware analysis☆41Updated 10 years ago
- find public zombie hosts for idle scanning, using shodan search and nmap☆24Updated 10 years ago
- ☆147Updated 9 years ago
- Get your APT on using social media as a tool for data exfiltration.☆148Updated 3 years ago
- Password analysis software☆37Updated 10 years ago
- A honeypot for malware that propagates via USB storage devices☆101Updated 10 years ago
- Automated memory forensics analysis☆32Updated 6 years ago
- Monitoring 'DNS' inside the Tor network☆93Updated 9 years ago
- ☆384Updated 13 years ago
- Honeypot (Dionaea and kippo) setup script☆84Updated 9 years ago
- A web spider's worst nightmare.☆54Updated 13 years ago
- Cryptowall Tooling & Information☆37Updated 9 years ago
- General tools and scripts i want to make public to the world.☆46Updated 6 years ago
- Android wireless karma attack detector☆67Updated 10 years ago
- A powershell script for creating a Windows honeyport.☆90Updated 8 months ago
- A tool for scrapping the possible malware from the Wikileaks AKP leak☆101Updated 9 years ago
- Small tool for disassembling shellcode (using objdump)☆148Updated 3 years ago
- proof of concept to backdoor files from owncloud encryption module☆17Updated 9 years ago
- HORSEPILL rootkit PoC☆229Updated 9 years ago
- A collection of post-exploitation tools for network red teaming.☆139Updated 7 years ago
- CLI crypto swiss-army knife for performing and composing encoding, decoding, encryption, decryption, hashing, and other various cryptogra…☆118Updated 7 years ago