carlospolop / easy_stegoCTF
Brutteforce for stego CTFs
☆16Updated 2 years ago
Alternatives and similar repositories for easy_stegoCTF:
Users that are interested in easy_stegoCTF are comparing it to the libraries listed below
- Try to bruteforce several cypher algorithms that can be used in CTFs☆13Updated 2 years ago
- Automate the creation of Backdoors and postexplotation activities☆22Updated 2 years ago
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆25Updated last year
- Noob Penetration tester☆11Updated 8 months ago
- Bludit <= 3.9.2 - Authentication Bruteforce Mitigation Bypass☆14Updated 4 years ago
- Bash Recon Scan - Recon and Scan a network using Bash☆29Updated 2 years ago
- Sp00fer blog post -☆25Updated 2 years ago
- Command and Control Framework☆14Updated 10 months ago
- Central IoC scanner based on Loki☆20Updated 3 years ago
- With the help of this docker image, you can easily access PEzor on your system!☆15Updated 2 years ago
- Windows Keylogger in C++☆18Updated 2 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆17Updated 4 years ago
- Custom pentesting tools☆24Updated 4 years ago
- SecretSmasher is a Red Team tool used for brute-forcing Cisco enable passwords☆13Updated 4 years ago
- ☆12Updated 3 years ago
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 2 years ago
- Polymorphic code obfuscator for use in Red Team operations☆30Updated 2 years ago
- Convert domain lists to resolved IP without duplicated, useful for strong large recon, and Bug Bounty☆13Updated 3 years ago
- pwncat windows c2 components☆18Updated 3 years ago
- ☆12Updated 4 years ago
- Recon-ng modules for basic OSINT.☆11Updated 2 years ago
- Various scripts & tools☆11Updated 9 months ago
- Exfiltrate data with DNS queries. Based on CertUtil and NSLookup.☆22Updated last year
- Simple C2 over the Trello API☆37Updated 2 years ago
- This contains common OSCP local exploits and enumeration scripts☆11Updated 9 years ago
- Searching .evtx logs for remote connections☆24Updated last year
- ☆22Updated 2 years ago
- ASLR Evasion, Egghunters, SEH Overwrites☆29Updated 3 years ago
- Use rpc null sessions to retrieve machine list, domain admin list, domain controllers☆14Updated 2 years ago
- ☆17Updated 4 years ago