IMAJS meet <img>
☆54Jun 4, 2015Updated 10 years ago
Alternatives and similar repositories for stegosploit
Users that are interested in stegosploit are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Python port of stegosploit toolkit☆11Mar 9, 2019Updated 7 years ago
- PoC Reverse Text segment ELF File infector☆14Feb 28, 2020Updated 6 years ago
- Miscellaneous exploit scripts☆17May 24, 2022Updated 3 years ago
- ☆32Feb 27, 2018Updated 8 years ago
- Results of a recent FOIA for NIST documents related to the design of Dual EC DRBG. Via EFF and Rep. Grayson's office. See README for deta…☆24Feb 10, 2015Updated 11 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Burp Extension to manipulate AES encrypted payloads☆13Feb 4, 2022Updated 4 years ago
- Reverse TCP Python Framework☆25Nov 7, 2017Updated 8 years ago
- Format string exploit generation☆10Sep 16, 2015Updated 10 years ago
- PoC - Exploit Delivery via Steganography and Polyglots, CVE-2014-0282☆53May 27, 2024Updated last year
- PoC multi-layer protector for ELF32 x86 binaries☆12Feb 26, 2022Updated 4 years ago
- The defuse.ca pastebin.☆23Jan 16, 2019Updated 7 years ago
- Binary Ninja script to decrypt strings in Mirai samples☆21Jun 30, 2021Updated 4 years ago
- Example of JS injection using Man-in-the-middle proxy☆26Jun 29, 2021Updated 4 years ago
- Repository of exploits for research purposes☆15Jul 12, 2023Updated 2 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Efficient clustering of MASSCAN results☆12Dec 26, 2016Updated 9 years ago
- PoC to tunnel the Meterpreter reverse HTTP shell over RDP Virtual Channels☆67Feb 23, 2015Updated 11 years ago
- Forced Man-In-The-Middle HTTPs-Avoiding Reverse Proxy☆62Oct 23, 2019Updated 6 years ago
- ☆13Apr 8, 2022Updated 4 years ago
- collection of pentest tools☆26Aug 4, 2019Updated 6 years ago
- VAMPY - Minimal tool for RAM dumping.☆10Jul 1, 2017Updated 8 years ago
- xnu-10.10 mach-o loader that compiles in userland☆20Aug 5, 2015Updated 10 years ago
- software for the Girl Tech IM-Me☆12Mar 19, 2015Updated 11 years ago
- Various Cheat Sheets related to development and security☆144Jul 16, 2020Updated 5 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- DDoor - cross platform backdoor using dns txt records☆30Sep 27, 2021Updated 4 years ago
- Exploits locked/password protected computers over USB, drops persistent WebSocket-based backdoor, exposes internal router, and siphons co…☆11Dec 28, 2016Updated 9 years ago
- Faceted search example using Swiftype and jQuery☆14Jun 23, 2023Updated 2 years ago
- Source Code for 'Agile Artificial Intelligence in Pharo' by Alexandre Bergel☆14Apr 26, 2026Updated last week
- Repo for the paper "USB Devices phoning home"☆22Feb 12, 2016Updated 10 years ago
- Embeddable MCP stdio → HTTP bridge with background jobs & live dashboard. Survives Vercel/Cloudflare 30s timeouts. Now scales to 100+ use…☆61Feb 23, 2026Updated 2 months ago
- Magento2. Code samples for Magento2 developers.☆11Jan 22, 2018Updated 8 years ago
- PoC for obfuscating the dynamic symbol table injecting a custom Hash Table to do symbol resolution☆30Sep 10, 2020Updated 5 years ago
- Fixes core Magento 2 issue related to "Payment Method" condition in discount rules☆11May 18, 2020Updated 5 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Dynamic Callbacks can be used for re-establishing communication with C2 infrastructure and for achieving persistence by using different m…☆15Oct 17, 2018Updated 7 years ago
- TOXID cURL Module connects OXID eShop with TYPO3 and other CMS☆27Apr 18, 2026Updated 2 weeks ago
- ☆54Sep 6, 2020Updated 5 years ago
- Python tool to inject DLLs into processes☆11Jun 29, 2017Updated 8 years ago
- SteCoSteg is OutGuess successor and Vernam cipher analog in steganography.☆56Feb 16, 2019Updated 7 years ago
- Evasive ELF Static PIE User-Land-Exec featured in Tmpout Vol 1.☆29Sep 11, 2021Updated 4 years ago
- Mitre chopshop network decoder framework☆31Oct 13, 2025Updated 6 months ago