Collection of steganography tools for images and text
☆42Nov 15, 2023Updated 2 years ago
Alternatives and similar repositories for stegano-tools
Users that are interested in stegano-tools are comparing it to the libraries listed below
Sorting:
- Android application penetration testing for the masses.☆13Apr 12, 2019Updated 6 years ago
- A collection of commands, tools, techniques and procedures of the purplestorm ctf team.☆14Mar 20, 2025Updated last year
- Cheatsheet collection of Infosec tools☆15May 18, 2019Updated 6 years ago
- The most extensive collection of BOFs (Beacon Object Files) tailored for Red Teams using C++23☆23Jun 19, 2025Updated 9 months ago
- Proof of Concept in Go from Secureworks' research on Azure Active Directory Brute-Force Attacks. Inspired by @treebuilder's POC on PowerS…☆14Feb 23, 2022Updated 4 years ago
- Repo for hosting various scripts for creating users for password spraying and other password attacks.☆11Jul 9, 2020Updated 5 years ago
- A python script to check if URLs are allowed or disallowed by a robots.txt file.☆23Feb 11, 2025Updated last year
- Everything about xss protection technology☆14Oct 22, 2019Updated 6 years ago
- POC exploit for CVE-2015-10141☆30Aug 11, 2025Updated 7 months ago
- NativePayload_TiACBT (Remote Thread Injection + C# Async Method + CallBack Functions Technique)☆13Jun 6, 2023Updated 2 years ago
- Remove Offensive and Profane Words from Wordlists☆15Jul 27, 2023Updated 2 years ago
- ☆27Aug 15, 2022Updated 3 years ago
- ☆17Apr 5, 2021Updated 4 years ago
- PyDFIRRam is a Python library leveraging Volatility 3 to simplify and enhance memory forensics. It streamlines the research, parsing, and…☆27Sep 17, 2024Updated last year
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆20Sep 22, 2021Updated 4 years ago
- A Docker container used to easily compile Nim binaries generated by my tools (NimPackt and NimPlant)☆16Aug 31, 2023Updated 2 years ago
- A nostalgic journey back to the era of retro RPGs with a cyber twist in the theme of Die Hard☆32Sep 2, 2023Updated 2 years ago
- For finding secrets, tokens and other common mistakes made by developers.☆12Oct 21, 2025Updated 4 months ago
- An Aggressor Script that utilizes NtCreateUserProcess to run binaries☆31Jan 30, 2025Updated last year
- Identify the different types of hashes used to encrypt passwords.☆10Mar 12, 2017Updated 9 years ago
- My Linux profiles built for Volatility 2/3☆10Oct 11, 2025Updated 5 months ago
- Runs sshd as a unprivileged user for persistence☆11Jun 23, 2019Updated 6 years ago
- Multithreaded DNS recursive host brute-force tool☆13May 11, 2015Updated 10 years ago
- ☆20Nov 14, 2024Updated last year
- A small to find Host Header Injection vulnerabilities in a websites☆12Nov 21, 2022Updated 3 years ago
- ☆10Aug 17, 2021Updated 4 years ago
- Simple Script "NativePayload_ARP2.sh" for Sending DATA via ARP Bcast Traffic to all systems in (LAN) by "Vid" tag☆13Jun 5, 2023Updated 2 years ago
- Remote Thread Injection by C# + Delegate Techniques☆12Jun 6, 2023Updated 2 years ago
- Erebus is a payload generator written in Nim.☆17Jun 13, 2023Updated 2 years ago
- Python Scanner and Exploiter of Remote File Inclusion Vulnerabilitie☆13Jan 6, 2022Updated 4 years ago
- Obtain the revocation status of an X.509 certificate.☆16Updated this week
- Sleep obfuscation in golang based on ekko☆14Jan 16, 2024Updated 2 years ago
- Deobfuscator for : https://github.com/Blank-c/BlankOBF☆14Aug 21, 2023Updated 2 years ago
- 🔍sᴏᴄɪᴀʟ ᴍᴇᴅɪᴀ ʟᴏᴏᴋᴜᴘ🔍