dishather / steganodiskLinks
Tool to hide data in untouched sectors of hard disks and flash drives
☆14Updated 6 years ago
Alternatives and similar repositories for steganodisk
Users that are interested in steganodisk are comparing it to the libraries listed below
Sorting:
- Dump Windows registry hives as text.☆16Updated 6 years ago
- Mobile phone PWN tools and scripts☆15Updated 4 years ago
- This tool can be used during internal penetration testing to dump Windows credentials from an already-compromised host. Use it to copy SY…☆15Updated 8 years ago
- A Windows script to monitor registry hives for modifications & notify you when modifications have occured.☆23Updated 5 years ago
- A Hacking and Pentesting Tool for Windows☆20Updated 4 months ago
- Monitoring Registry and File Changes in Windows☆72Updated 11 months ago
- USBNinja Android Remote Control Application☆30Updated 6 years ago
- MailSniper is a penetration testing tool for searching through email in a Microsoft Exchange environment for specific terms (passwords, i…☆17Updated 3 years ago
- ☆28Updated 2 weeks ago
- List of awesome reverse engineering resources☆7Updated 5 years ago
- ARP Man-in-the-Middle tool☆29Updated 6 months ago
- Super simple loader that spreads over removable drives (USB flash drives, portable and network drives, SD cards). Features: You can add t…☆31Updated 6 years ago
- Capturing audio (.wav) from target using a link☆13Updated 5 years ago
- Demonstrate the behavior of the tunnel cache on Windows☆10Updated 5 years ago
- Network sniffing automation with Bettercap as rogue AP or as client in your network☆25Updated 3 years ago
- Launch a Windows EXE file with this EXE file (application filter evasion)☆13Updated 8 years ago
- Refluxion -- MITM WPA attacks tool☆37Updated 4 years ago
- ARP cache poisoning, sniffing, HTTPS/IMAP4S/POP3S MITM-ing (without APE) tool to analyze data traffic in a LAN☆9Updated 11 years ago
- SIP hacking tools and scripts☆22Updated 4 years ago
- DDoS Hack Tools Pack☆14Updated 4 years ago
- A template-based tool for quickly constructing and running advanced Boolean searches on Google and Twitter/X for person-based OSINT inves…☆15Updated 6 months ago
- Multifunctional keylogger using WinAPI and libcurl☆17Updated 3 years ago
- Apple wireless research and tools☆18Updated 4 years ago
- Tiny keylogger for Win XP/Vista/7/8 with ftp upload.☆15Updated 3 years ago
- Windows application aiming to preserve cryptographic information used by ransomware operations. If you suspect a ransomware is running on…☆29Updated 7 years ago
- The WiFi Penetration Toolkit☆28Updated 3 years ago
- Shadow Strike is a hacking framework that aids in information gathering, payload generation, payload delivery, and website exploitation.☆8Updated 4 years ago
- Much like John the Ripper, without all the fancy shit. Just reads from a wordlist and cracks those hashes.☆15Updated 4 years ago
- Tool useful to discover services behind unknown ports☆13Updated 4 years ago
- PNG Steganography Command-Line Tool & Web App.☆12Updated this week