IMAJS meet <img>
☆54Jun 4, 2015Updated 10 years ago
Alternatives and similar repositories for stegosploit
Users that are interested in stegosploit are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- PoC Reverse Text segment ELF File infector☆14Feb 28, 2020Updated 6 years ago
- Miscellaneous exploit scripts☆17May 24, 2022Updated 3 years ago
- Results of a recent FOIA for NIST documents related to the design of Dual EC DRBG. Via EFF and Rep. Grayson's office. See README for deta…☆24Feb 10, 2015Updated 11 years ago
- Reverse TCP Python Framework☆25Nov 7, 2017Updated 8 years ago
- Format string exploit generation☆10Sep 16, 2015Updated 10 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Discovery will gather DNS entry, subdomains and domains linked, all files publicly exposed to gather metadatas, check for dumps on Pasteb…☆14Mar 18, 2019Updated 7 years ago
- PoC multi-layer protector for ELF32 x86 binaries☆12Feb 26, 2022Updated 4 years ago
- A repository teaching bss/data segment exploitation techniques.☆13Aug 11, 2019Updated 6 years ago
- Example of JS injection using Man-in-the-middle proxy☆26Jun 29, 2021Updated 4 years ago
- Repository of exploits for research purposes☆15Jul 12, 2023Updated 2 years ago
- Efficient clustering of MASSCAN results☆12Dec 26, 2016Updated 9 years ago
- PoC to tunnel the Meterpreter reverse HTTP shell over RDP Virtual Channels☆67Feb 23, 2015Updated 11 years ago
- collection of pentest tools☆26Aug 4, 2019Updated 6 years ago
- VAMPY - Minimal tool for RAM dumping.☆10Jul 1, 2017Updated 8 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- xnu-10.10 mach-o loader that compiles in userland☆20Aug 5, 2015Updated 10 years ago
- software for the Girl Tech IM-Me☆12Mar 19, 2015Updated 11 years ago
- Various Cheat Sheets related to development and security☆144Jul 16, 2020Updated 5 years ago
- 🍎MacBook Pro for Pentest☆12Mar 1, 2020Updated 6 years ago
- DDoor - cross platform backdoor using dns txt records☆30Sep 27, 2021Updated 4 years ago
- Exploits locked/password protected computers over USB, drops persistent WebSocket-based backdoor, exposes internal router, and siphons co…☆11Dec 28, 2016Updated 9 years ago
- Haskell module for parsing of Go source code, forked from Hackage☆13Aug 8, 2018Updated 7 years ago
- A full example report☆11Jul 23, 2019Updated 6 years ago
- #usr/bin/bash clear bi='\033[34;1m' #biru i='\033[32;1m' #ijo pur='\033[35;1m' #purple cy='\033[36;1m' #cyan me='\033[31;1m' #merah pu='\…☆11Mar 24, 2019Updated 7 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Pure python, slow and standard implementation of PKCS #1 also knows as RSA☆31May 2, 2023Updated 2 years ago
- Python 3.6+ modules written on pure Go 1.10+. No CFFI, no CTypes, no CGo, no PyBindGen, just import *.go files from Python.☆20May 3, 2018Updated 7 years ago
- Magento2. Code samples for Magento2 developers.☆11Jan 22, 2018Updated 8 years ago
- PoC for obfuscating the dynamic symbol table injecting a custom Hash Table to do symbol resolution