DNSCat PNG Extractor is a Python tool designed for the extraction of PNG image data from DNS exfiltration attempts using DNScat
β10Nov 15, 2023Updated 2 years ago
Alternatives and similar repositories for DNSCat-PNG-Extractor
Users that are interested in DNSCat-PNG-Extractor are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- π Welcome to the Cyber Library your ultimate resource for everything cybersecurity.β32Updated this week
- SΓ©curitΓ© informatique pratique Γ travers Python (cours de l'ESGI)β17Mar 7, 2020Updated 6 years ago
- Create beautiful GitHub profile. Clone this repo and create your own cool github profile readme file.β23May 11, 2024Updated last year
- Breakout game implemented using strict ECS architecture. Used as a testbed.β21Aug 4, 2023Updated 2 years ago
- MITMsmtp is an Evil SMTP Server for pentesting SMTP clients to catch login credentials and mails sent over plain or SSL encrypted connectβ¦β45Jan 28, 2024Updated 2 years ago
- Proton VPN Special Offer - Get 70% off β’ AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- gitlinks - Git Powered Go-Links! π΄ββ24May 31, 2022Updated 3 years ago
- Our repo for crushing through RTO course & labs.β37Sep 12, 2022Updated 3 years ago
- Automating Juicy Potato Local Privilege Escalation CMD exploit for penetration testers.β48Dec 13, 2022Updated 3 years ago
- Outils ESD academyβ63May 5, 2022Updated 3 years ago
- Target practice for ffufβ71Aug 10, 2021Updated 4 years ago
- A simple Bash script to check SSL certificate details for any domain from the command line, inspired by https://sslshopper.comβ50Oct 13, 2024Updated last year
- A toolkit for the post-mortem examination of Docker containers from forensic HDD copiesβ111Feb 18, 2024Updated 2 years ago
- a client-only layer of protection from the wiretap/sniff/IDS analysisβ112Aug 25, 2017Updated 8 years ago
- A curated list of static analysis tools, linters and code quality checkers for various programming languagesβ48Nov 15, 2016Updated 9 years ago
- Managed Database hosting by DigitalOcean β’ AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Root shell PoC for CVE-2021-3156β71Feb 3, 2021Updated 5 years ago
- Windows library for hooking functions across processes, injecting DLLs into other applications, and more. (Somewhat similar to MS Detoursβ¦β12Apr 2, 2013Updated 12 years ago
- Safari Extension / Filter List to remove Distractions on YouTubeβ109Jun 30, 2023Updated 2 years ago
- Parser for $UsnJrnl on NTFSβ122Nov 27, 2022Updated 3 years ago
- A visual methodology tracking platform tailored for offensive security assessmentsβ244Feb 10, 2026Updated last month
- Pipeleek scans CI/CD logs and artifacts to detect leaked secrets and pivot from themβ19Updated this week
- An utility to download PDB files associated with a Portable Executable (PE).β15Feb 18, 2025Updated last year
- β15Jun 27, 2024Updated last year
- Certified Red Team Operator (CRTO) Cheatsheet and Checklistβ219Mar 16, 2024Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways β’ AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Abusing Remote Windows SMB Shares for Fun and Pen Testingβ15May 23, 2023Updated 2 years ago
- Multi platform toolkit for an interactive DNS shell commands exfiltration, by using DNS-Cat you will be able to execute system commands iβ¦β113Sep 15, 2022Updated 3 years ago
- A PowerShell script designed to detect misconfigured Azure Storage Accounts that could potentially be exploited for privilege escalation β¦β13Apr 25, 2024Updated last year
- A webshell application and interactive shell for pentesting Apache Tomcat servers.β128Feb 11, 2025Updated last year
- Deobfuscation of XorStringsNetβ14Nov 5, 2024Updated last year
- β14Mar 19, 2024Updated 2 years ago
- Detecting cryptocurrency-related communications in network trafficβ12Apr 5, 2020Updated 5 years ago
- MacroPhantom automates the process of generating XOR+Caesar encrypted shellcode and embedding it into VBA macros for Microsoft Office docβ¦β19Mar 20, 2025Updated last year
- β12Mar 20, 2026Updated last week
- GPU virtual machines on DigitalOcean Gradient AI β’ AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- A curated repository of incident response playbooksβ120Jul 17, 2023Updated 2 years ago
- The all-in-one hacking toolbox for hardware penetration testing.β18Jun 4, 2024Updated last year
- Demo repository for running eBPF in GitHub Actionsβ23Mar 27, 2025Updated last year
- Identifies the bytes that Microsoft Defender / AMSI Consumer flags on.β11May 17, 2024Updated last year
- vulnerable APIs inspired by https://github.com/mattvaldes/vulnerable-apiβ13Dec 8, 2021Updated 4 years ago
- Session material from my conference presentation at Live360\Techmentor in Orlando,November 2023β11Nov 14, 2023Updated 2 years ago
- Go library to allow native inline hooking in windows at runtimeβ14Feb 7, 2024Updated 2 years ago