IMAJS meet <img>
☆54Jun 4, 2015Updated 10 years ago
Alternatives and similar repositories for stegosploit
Users that are interested in stegosploit are comparing it to the libraries listed below
Sorting:
- Modular command-line threat hunting tool & framework.☆17Jul 20, 2020Updated 5 years ago
- Miscellaneous exploit scripts☆17May 24, 2022Updated 3 years ago
- Binary Ninja script to decrypt strings in Mirai samples☆21Jun 30, 2021Updated 4 years ago
- ☆18Oct 15, 2025Updated 4 months ago
- ☆20Jul 14, 2019Updated 6 years ago
- collection of pentest tools☆26Aug 4, 2019Updated 6 years ago
- Repo for the paper "USB Devices phoning home"☆22Feb 12, 2016Updated 10 years ago
- Code snippets I find useful☆32Sep 25, 2017Updated 8 years ago
- Forced Man-In-The-Middle HTTPs-Avoiding Reverse Proxy☆62Oct 23, 2019Updated 6 years ago
- BlueSploit is a DFIR framework with the main purpose being to quickly capture artifacts for later review.☆32Jan 1, 2020Updated 6 years ago
- Exfiltration Framework - Exfiltration modeling tool written in Python. Naisho attempts to avoid detection from DLP, IPS/IDS egress filter…☆38Oct 29, 2014Updated 11 years ago
- A magnet u-joint arms and effector for the Rostock delta 3d printer.☆20May 31, 2013Updated 12 years ago
- Generates long-lived access tokens for any given Facebook app and user credentials☆10May 25, 2017Updated 8 years ago
- Various Cheat Sheets related to development and security☆144Jul 16, 2020Updated 5 years ago
- Transforms for the AlienVault OTX service☆39Nov 3, 2016Updated 9 years ago
- WhatScriptApp es un programa que nos ayudara a hacer spam masivo , el proyecto lo he realizado mas que todo para marketing digital cuando…☆10Aug 4, 2023Updated 2 years ago
- Optimized Circuit Generation for Secure Multiparty Computation☆12Nov 25, 2019Updated 6 years ago
- A collection of phishing techniques used to evade detection. #nolockdown☆23Aug 28, 2025Updated 6 months ago
- ☆16May 13, 2021Updated 4 years ago
- Firmware for Suyu☆12Jun 8, 2024Updated last year
- ☆12Aug 1, 2025Updated 7 months ago
- ☆11Aug 11, 2016Updated 9 years ago
- A fully automated setup of Shibboleth Idp and SP with many options and features☆12Mar 31, 2022Updated 3 years ago
- Python script to create CSV, HTML & PDF filtered for repo tags☆13Jul 26, 2024Updated last year
- This program aims to check active targets by saving screenshots in a project.☆14Jan 9, 2026Updated last month
- Supermicro IPMI/BMC Cleartext Password Scanner☆40Sep 6, 2015Updated 10 years ago
- Assembly code to use for Windows kernel shellcode to edit winlogon.exe ACL☆13Mar 6, 2017Updated 9 years ago
- A C++11 command line parser☆14Feb 26, 2017Updated 9 years ago
- Collection of tools related to 7z, stego, and CTFs☆14Oct 9, 2020Updated 5 years ago
- Automated Mass Exploiter☆11Apr 14, 2019Updated 6 years ago
- Small snippets of code we often find useful☆11Nov 9, 2019Updated 6 years ago
- React UI☆11Jan 4, 2023Updated 3 years ago
- SSDT_process_hide_protect☆10Jul 17, 2014Updated 11 years ago
- This library provides functionality for fetching and parsing information about Common Vulnerabilities and Exposures (CVE) using the NIST …☆14May 11, 2023Updated 2 years ago
- Flexible OpenVPN authentication server and vpn client configuration tools☆13Mar 6, 2012Updated 14 years ago
- ☆10Apr 10, 2024Updated last year
- TUN device creation and handling.☆11Oct 28, 2022Updated 3 years ago
- Annual info about co2 emissions per nation☆14Dec 6, 2024Updated last year
- Format string exploit generation☆10Sep 16, 2015Updated 10 years ago