cle0n / myoolLinks
[Anti-Forensics, Steganography, Data Exfiltration] Encrypt a file and hide it in any PDF.
☆13Updated 8 years ago
Alternatives and similar repositories for myool
Users that are interested in myool are comparing it to the libraries listed below
Sorting:
- Anti-forensic monitor program: watches for signs of tampering and purges keys/shuts everything down.☆30Updated 9 years ago
- Investigation data from two reports around the Blue Coat networking kit.☆17Updated 11 years ago
- Geolocate your files!☆16Updated 3 years ago
- Bruteforce commandline buffer overflows and automated exploit generation, linux, aggressive arguments☆34Updated 3 years ago
- mOrc is a post-exploitation framework for macOS written in Bash☆20Updated 2 years ago
- Repository for Tor's DNS-related issues.☆17Updated 8 years ago
- like hidden-tear with libsodium☆20Updated 9 years ago
- ☆15Updated 8 years ago
- sslxray is an SSL/TLS scanning tool designed to detect a wide range of issues☆27Updated 6 years ago
- Diebold Accuvote-TSx Election Machine Hacking☆39Updated 5 years ago
- Functions and other Code Snippets often found in Offensive Code or Malware☆22Updated 10 years ago
- A Camouflage Proxy for the Tor Anonymity System☆82Updated 9 years ago
- quotes i like.☆15Updated 5 years ago
- ☆20Updated 4 years ago
- A partial Onion Proxy implementation that's designed to build single-hop circuits through Tor exit nodes☆145Updated 9 years ago
- NAT Pinning test suite tool for penetration testers.☆31Updated 11 years ago
- 0-ring rootkit revealer for Linux☆28Updated 5 years ago
- Man-in-the-middle against Tor bridges☆26Updated 5 years ago
- Warning: These are REAL, EVIL executables.. download at your own risk, submit your own.☆19Updated 5 years ago
- Check All APK's -- scripts for checking your phone for malware☆30Updated 7 years ago
- Openssh backdoor found with a ssh honeypot☆28Updated 8 years ago
- CVE-2017-5689 Proof-of-Concept exploit☆56Updated 7 years ago
- ☆11Updated 9 years ago
- Passive DHCP fingerprinting implementation☆51Updated 9 years ago
- Wardriving ekoparty☆15Updated 7 years ago
- Some metasploit scripts to help to control busybox based embedded devices☆26Updated 9 years ago
- Browser extension that complements the PhishDetect service☆24Updated 2 years ago
- Universal LAN-based SSRF Attack Primitive☆19Updated 5 years ago
- Solutions for various crackmes☆20Updated 12 years ago
- Every document published from the Snowden archive☆69Updated 10 years ago