☆39Aug 5, 2016Updated 9 years ago
Alternatives and similar repositories for instegogram
Users that are interested in instegogram are comparing it to the libraries listed below
Sorting:
- Vendont is a Venmo transaction finder/scraper. It uses Venmo's own public API system to fetch all transactions at a given time.☆10Jun 16, 2019Updated 6 years ago
- A proof of concept for Metasploit's CVE-2019-5624 vulnerability (Rubyzip insecure ZIP handling RCE)☆13May 2, 2019Updated 6 years ago
- Nanolat Database supporting 1M transactions per second.☆23Apr 26, 2014Updated 11 years ago
- Using Shodan to get a breakdown of the most common key names in public Redis servers.☆13Dec 10, 2017Updated 8 years ago
- ☆11Mar 12, 2021Updated 4 years ago
- Network Defender Toolkit☆18Jun 11, 2013Updated 12 years ago
- ☆75Jan 24, 2017Updated 9 years ago
- Communicate with a remote shell easily☆12Dec 10, 2017Updated 8 years ago
- Totally legitimate☆11May 15, 2019Updated 6 years ago
- A collection of useful radare2 scripts!☆32Feb 2, 2018Updated 8 years ago
- Leak windows system info through a docx file☆12Feb 23, 2020Updated 6 years ago
- A tool to generate media files with malicious metadata☆129Feb 2, 2019Updated 7 years ago
- Ptcoresec jeopardy style scoreboard☆23Jul 17, 2012Updated 13 years ago
- Security tool to quickly audit Public Box files and folders.☆54Sep 29, 2019Updated 6 years ago
- eXtremely fast data eXtraction via blind SQL injection☆14Aug 15, 2012Updated 13 years ago
- libopcodes-based disassembler☆35Aug 8, 2020Updated 5 years ago
- Python library created while solving the Matasano Cryptopals challenges☆17Jun 17, 2021Updated 4 years ago
- Methods of C2☆22Jul 15, 2015Updated 10 years ago
- A collection of tools mostly written in Python.☆15Feb 4, 2015Updated 11 years ago
- Transform any javascript code to an equivalent sequence of ()[]{}!☆20Jul 12, 2022Updated 3 years ago
- A golang CLI to setup honey pots https://en.wikipedia.org/wiki/Honeypot_(computing)☆16Jul 19, 2020Updated 5 years ago
- Kerberos / Windows AD / Linux PAM password change check against breached lists (HIBP), and other rules☆161Feb 2, 2023Updated 3 years ago
- CVE-2018-18368 SEP Manager EoP Exploit☆17Nov 27, 2019Updated 6 years ago
- A while back antirez, in a post to Bugtraq, detailed a new Tcp portscan method.☆16Apr 21, 2017Updated 8 years ago
- collection of translation documents.☆16Mar 31, 2019Updated 6 years ago
- BONOMEN - Hunt for Malware Critical Process Impersonation☆50Nov 30, 2020Updated 5 years ago
- This is a release of the torCT PHP RAT for people willing to research RATs and how they work.☆18Dec 3, 2015Updated 10 years ago
- A script for generating custom passphrase lists to be used for password cracking with hashcat rules☆81Jun 27, 2018Updated 7 years ago
- A library for efficient interception of established TCP connections☆20Oct 12, 2015Updated 10 years ago
- Local privilege escalation scripts and tools☆17Aug 4, 2016Updated 9 years ago
- 382 Slayer Leecher Keywords.☆10Apr 19, 2021Updated 4 years ago
- Experiments on C/C++ Exploits☆22Jun 30, 2020Updated 5 years ago
- OpSec in OSINT - An evolving guide on how to stay safe and private during open source intelligence investigations☆21Jul 4, 2017Updated 8 years ago
- quals-2014☆21Nov 3, 2014Updated 11 years ago
- A multi-purpose meterpreter executable (inline, many transports, msfpayload)☆81Mar 7, 2018Updated 7 years ago
- ☆229May 10, 2018Updated 7 years ago
- Fucking Search Engines Scraper - python library to scrap url's from search engines☆49Sep 6, 2017Updated 8 years ago
- ☆22Sep 27, 2017Updated 8 years ago
- z3 scripts and ctf challenge solutions.☆24Dec 21, 2022Updated 3 years ago