epinna / StegosipView external linksLinks
TCP tunnel over RTP/SIP
☆96Jun 30, 2020Updated 5 years ago
Alternatives and similar repositories for Stegosip
Users that are interested in Stegosip are comparing it to the libraries listed below
Sorting:
- Security Advisories and Researches☆15Aug 19, 2014Updated 11 years ago
- Programmatically access a TLS certificate chain in C++ and C#☆12Oct 27, 2018Updated 7 years ago
- JavaScript Reversed TCP Meterpreter Stager☆138May 25, 2017Updated 8 years ago
- A collection of scripts that I've written while pentesting.☆31Aug 3, 2018Updated 7 years ago
- Arya is a simple obfuscator for .NET binaries.☆38Dec 11, 2017Updated 8 years ago
- Supermicro IPMI/BMC Cleartext Password Scanner☆40Sep 6, 2015Updated 10 years ago
- Static Php Analysis and Fuzzer☆26Apr 22, 2014Updated 11 years ago
- CScriptShell, a Powershell Host running within cscript.exe☆162Apr 11, 2017Updated 8 years ago
- Decrypt Matrix42 Empirum /EIS Passwords☆14Mar 31, 2021Updated 4 years ago
- Read-only Slack RTM API CLI for monitoring teams☆10Mar 18, 2019Updated 6 years ago
- Recursively extract urls from a web page for reconnaissance.☆12Jun 9, 2024Updated last year
- Windows DLL Loading Utility☆12Jun 11, 2020Updated 5 years ago
- ☆24Feb 19, 2017Updated 8 years ago
- Inf0rm3r - A Linux Info & Ssytem Enumeration Script☆12Aug 2, 2013Updated 12 years ago
- Dump Windows registry hives as text.☆17Feb 9, 2019Updated 7 years ago
- ☆11Apr 30, 2015Updated 10 years ago
- Basic Windows 32-bit debugger with special functions like directory monitoring and DLL injection☆14Mar 7, 2019Updated 6 years ago
- Oracle Attacks Tool☆13Aug 9, 2016Updated 9 years ago
- Uses the default firebird database credentials to perform a database dump☆11Jan 10, 2015Updated 11 years ago
- A collection of publicly released whitepapers☆49Sep 1, 2017Updated 8 years ago
- A WebDAV PROPFIND covert channel to deliver payloads☆52Nov 14, 2017Updated 8 years ago
- An email client in CLI, designed specifically for spearphishing.☆13Jul 25, 2019Updated 6 years ago
- ☆12Aug 29, 2025Updated 5 months ago
- Script and metasploit module for CVE-2018-15982☆11Aug 12, 2020Updated 5 years ago
- Desktop shortcuts (.desktop) create a risk for code execution via social engineering☆10Feb 6, 2017Updated 9 years ago
- Create one or more monitor-mode virtual wireless interfaces with unique mac addresses.☆12Dec 14, 2018Updated 7 years ago
- Various Crypter Project☆55Feb 26, 2014Updated 11 years ago
- A Tool for cross-platform System Enumeration☆12Mar 20, 2017Updated 8 years ago
- Pdf File : Exfiltration and Uploading DATA by DNS Traffic (AAAA Records)☆10Jun 7, 2023Updated 2 years ago
- C# code for Transferring Backdoor Payloads by ICMPv4 Traffic and bypassing Anti-Viruses☆29Jun 6, 2023Updated 2 years ago
- outis is a custom Remote Administration Tool (RAT) or something like that. It was build to support various transport methods (like DNS) a…☆126Sep 19, 2017Updated 8 years ago
- Create a reverse icmp tunnel to forward tcp traffic,this maybe useful in some lan env☆29Jun 5, 2016Updated 9 years ago
- 本脚本是HIDS组成的一部分,旨在对指定监控目录进行文件hash记录,定时运行,发现文件替换、修改等后门可疑程序。☆13Dec 15, 2017Updated 8 years ago
- EmPyre Web Interface☆12Mar 23, 2017Updated 8 years ago
- Virtual host brute forcer☆22Jan 10, 2014Updated 12 years ago
- My presentations from different conferences☆15Sep 12, 2018Updated 7 years ago
- Scanner for Regin Virtual Filesystems☆26Jan 20, 2015Updated 11 years ago
- Simple binary file disassembler based on libopcodes and bfd from binutils.☆27Jun 25, 2015Updated 10 years ago
- PSIKOTIK TSO User Enumerator☆17Aug 24, 2017Updated 8 years ago