DNSCat PNG Extractor is a Python tool designed for the extraction of PNG image data from DNS exfiltration attempts using DNScat
β10Nov 15, 2023Updated 2 years ago
Alternatives and similar repositories for DNSCat-PNG-Extractor
Users that are interested in DNSCat-PNG-Extractor are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- π Welcome to the Cyber Library your ultimate resource for everything cybersecurity.β35Mar 27, 2026Updated 3 weeks ago
- SΓ©curitΓ© informatique pratique Γ travers Python (cours de l'ESGI)β18Mar 7, 2020Updated 6 years ago
- Create beautiful GitHub profile. Clone this repo and create your own cool github profile readme file.β23May 11, 2024Updated last year
- Breakout game implemented using strict ECS architecture. Used as a testbed.β21Apr 2, 2026Updated 2 weeks ago
- MITMsmtp is an Evil SMTP Server for pentesting SMTP clients to catch login credentials and mails sent over plain or SSL encrypted connectβ¦β45Jan 28, 2024Updated 2 years ago
- Simple, predictable pricing with DigitalOcean hosting β’ AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- gitlinks - Git Powered Go-Links! π΄ββ24May 31, 2022Updated 3 years ago
- Our repo for crushing through RTO course & labs.β37Sep 12, 2022Updated 3 years ago
- Automating Juicy Potato Local Privilege Escalation CMD exploit for penetration testers.β48Dec 13, 2022Updated 3 years ago
- Outils ESD academyβ63May 5, 2022Updated 3 years ago
- Target practice for ffufβ72Aug 10, 2021Updated 4 years ago
- A simple Bash script to check SSL certificate details for any domain from the command line, inspired by https://sslshopper.comβ50Oct 13, 2024Updated last year
- A toolkit for the post-mortem examination of Docker containers from forensic HDD copiesβ110Feb 18, 2024Updated 2 years ago
- a client-only layer of protection from the wiretap/sniff/IDS analysisβ112Aug 25, 2017Updated 8 years ago
- A curated list of static analysis tools, linters and code quality checkers for various programming languagesβ49Nov 15, 2016Updated 9 years ago
- Wordpress hosting with auto-scaling - Free Trial β’ AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Root shell PoC for CVE-2021-3156β71Feb 3, 2021Updated 5 years ago
- Windows library for hooking functions across processes, injecting DLLs into other applications, and more. (Somewhat similar to MS Detoursβ¦β12Apr 2, 2013Updated 13 years ago
- Safari Extension / Filter List to remove Distractions on YouTubeβ109Jun 30, 2023Updated 2 years ago
- Parser for $UsnJrnl on NTFSβ123Nov 27, 2022Updated 3 years ago
- A visual methodology tracking platform tailored for offensive security assessmentsβ248Feb 10, 2026Updated 2 months ago
- Pipeleek scans CI/CD logs and artifacts to detect leaked secrets and pivot from themβ19Updated this week
- An utility to download PDB files associated with a Portable Executable (PE).β15Feb 18, 2025Updated last year
- β15Jun 27, 2024Updated last year
- Certified Red Team Operator (CRTO) Cheatsheet and Checklistβ225Mar 16, 2024Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial β’ AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Abusing Remote Windows SMB Shares for Fun and Pen Testingβ15May 23, 2023Updated 2 years ago
- Multi platform toolkit for an interactive DNS shell commands exfiltration, by using DNS-Cat you will be able to execute system commands iβ¦β114Sep 15, 2022Updated 3 years ago
- A PowerShell script designed to detect misconfigured Azure Storage Accounts that could potentially be exploited for privilege escalation β¦β13Apr 25, 2024Updated last year
- A webshell application and interactive shell for pentesting Apache Tomcat servers.β129Feb 11, 2025Updated last year
- Deobfuscation of XorStringsNetβ13Nov 5, 2024Updated last year
- β14Mar 19, 2024Updated 2 years ago
- Detecting cryptocurrency-related communications in network trafficβ11Apr 5, 2020Updated 6 years ago
- MacroPhantom automates the process of generating XOR+Caesar encrypted shellcode and embedding it into VBA macros for Microsoft Office docβ¦β21Mar 20, 2025Updated last year
- β12Mar 28, 2026Updated 3 weeks ago
- Bare Metal GPUs on DigitalOcean Gradient AI β’ AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- A curated repository of incident response playbooksβ122Jul 17, 2023Updated 2 years ago
- The all-in-one hacking toolbox for hardware penetration testing.β18Jun 4, 2024Updated last year
- Demo repository for running eBPF in GitHub Actionsβ23Mar 27, 2025Updated last year
- Identifies the bytes that Microsoft Defender / AMSI Consumer flags on.β11May 17, 2024Updated last year
- vulnerable APIs inspired by https://github.com/mattvaldes/vulnerable-apiβ13Dec 8, 2021Updated 4 years ago
- Session material from my conference presentation at Live360\Techmentor in Orlando,November 2023β11Nov 14, 2023Updated 2 years ago
- Go library to allow native inline hooking in windows at runtimeβ14Feb 7, 2024Updated 2 years ago