XlogicX / Explosive-Steganography
Explosive Steganography tools and presentation (as given at the HOPE number 9 conference)
☆21Updated 11 years ago
Alternatives and similar repositories for Explosive-Steganography
Users that are interested in Explosive-Steganography are comparing it to the libraries listed below
Sorting:
- An Intentionally Vulnerable Router Firmware Distribution☆64Updated 9 years ago
- Get email notification when Virus Total has a copy of your binary.☆167Updated 4 years ago
- Uses Shodan to locate HackingTeam C&C Servers.☆78Updated 9 years ago
- Modification and tools for using hostapd for rogue AP attacks impersonating WPA-Enterprise networks to steal user credentials☆40Updated 6 years ago
- Reverse Engineering and Exploit Development stuff☆31Updated 7 years ago
- ☆142Updated 8 years ago
- proof of concept to backdoor files from owncloud encryption module☆18Updated 9 years ago
- An automated script that download potential exploit for linux kernel from exploitdb, and compile them automatically☆25Updated 9 years ago
- Android wireless karma attack detector☆66Updated 9 years ago
- Unveiled at DEF CON 20, NTLM Relaying to ALL THE THINGS!☆259Updated 8 years ago
- Offensives network security framework for Wireless and MiTM style hacking☆60Updated 7 years ago
- Abstracts and expedites the process of backdooring stock firmware images for consumer/SOHO routers☆122Updated 11 years ago
- Resources for: "Playing games with an attacker: how I messed with someone trying to breach the CryptoWall tracker"☆24Updated 9 years ago
- Data Exfiltration and Command Execution via AAAA Records☆67Updated 8 years ago
- x86-64 Windows shellcode that recreates the Jurassic Park hacking scene (Ah, ah, ah... you didn't' say the magic word!)☆84Updated 4 years ago
- A PoC on passing data through UNIX file privilege bits (RWX Triplets)☆27Updated 7 years ago
- ☆137Updated 7 years ago
- Bluetooth PIN and LINK-KEY Cracker☆51Updated 11 years ago
- find public zombie hosts for idle scanning, using shodan search and nmap☆24Updated 10 years ago
- A web spider's worst nightmare.☆53Updated 12 years ago
- unix wildcard attacks☆133Updated 6 years ago
- An experimental implementation of a bot client which interprets commands through Twitter, thus requiring no hosting of servers from the c…☆43Updated 9 years ago
- Holepuncher, A wrapper script to open ports in iptables and start a listener.☆32Updated 9 years ago
- A collection of Teensy 2.0 (C) and PC (C#) files allowing on-the-fly simulation of USB peripherals from a PC.☆48Updated 12 years ago
- Rogue AP killer☆89Updated 7 years ago
- Python malware for pentesters that bypasses most antivirus (signature and heuristics) and IPS using sheer stupidity☆76Updated 11 years ago
- SensePost's network footprinting and enumeration tool. You can't pwn what you don't know about.☆43Updated 10 years ago
- Just a place to dump the cdma data I collected while at Defcon 2016☆50Updated 8 years ago
- Nacker is a tool to circumvent 802.1x Network Access Control (NAC) on a wired LAN. Nacker will help you locate any non-802.1x configurabl…☆105Updated 10 years ago
- Some NSE scripts to search information from routers☆36Updated 9 years ago