Insiderer looks inside files for metadata and hidden content
☆37May 11, 2015Updated 10 years ago
Alternatives and similar repositories for insiderer
Users that are interested in insiderer are comparing it to the libraries listed below
Sorting:
- Docvert for Python3: Converts Office files to DocBook and clean HTML, diagrams to SVG/PNG, etc.☆35Oct 25, 2015Updated 10 years ago
- pwning & info gathering via user browser☆39May 7, 2015Updated 10 years ago
- Packet Knock-Out is an exploration in a method of data exfiltration via packet port numbers.☆14Sep 18, 2016Updated 9 years ago
- Terminal Ip Lookup Tool☆56May 16, 2014Updated 11 years ago
- Published Articles of the Past (trying to be as complete as possible)☆15Jan 20, 2021Updated 5 years ago
- A task for potential Springload developers.☆11Mar 13, 2025Updated 11 months ago
- A duckyscript compatible Pi-Zero project, which utilises nmap - in particular the OS Detection features - to trigger OS-specific payloads…☆16Nov 29, 2016Updated 9 years ago
- Hackmelock Android application☆17Apr 11, 2017Updated 8 years ago
- A bridge to relay messages from a websocket feed to an IRC channel☆12Apr 10, 2015Updated 10 years ago
- This is a tiny Chrome Extension that protects your from Clipboard XSS Attacks☆19Mar 30, 2015Updated 10 years ago
- Pure python, SSL/TLS protocol and cipher scanner/enumerator.☆27Jun 16, 2025Updated 8 months ago
- Differential Analysis of Malware in Memory☆216Apr 16, 2017Updated 8 years ago
- unarcrypto is an educational tool to depict cryptography usage in zip, rar and 7zip archives☆97Nov 10, 2018Updated 7 years ago
- PoC to tunnel the Meterpreter reverse HTTP shell over RDP Virtual Channels☆67Feb 23, 2015Updated 11 years ago
- Interactive Virtual Machine Introspection☆18Sep 27, 2017Updated 8 years ago
- DRDoS UDP amplification tool☆17Jul 2, 2015Updated 10 years ago
- An environment for comprehensive, automated analysis of web-based exploits, based on Cuckoo sandbox.☆124Aug 10, 2015Updated 10 years ago
- An open source real-time network topology and protocols analyzer☆29Feb 22, 2017Updated 9 years ago
- Archive Mirror for recently republished PoC/Exploit code☆17Nov 26, 2017Updated 8 years ago
- Offline Digital Forensics Tool for Binary Files☆38Nov 6, 2017Updated 8 years ago
- DocBleachShell is the integration of the great DocBleach, https://github.com/docbleach/DocBleach Content Disarm and Reconstruction tool i…☆21Jan 15, 2022Updated 4 years ago
- A fully featured malware scanner for Linux desktops and servers.☆69May 18, 2022Updated 3 years ago
- Ransack Post Exploitation Tool☆16May 3, 2016Updated 9 years ago
- My collection of exploit development skeletons for fuzzing, overwriting the stack, remote code execution, etc.☆16Mar 19, 2025Updated 11 months ago
- IRC bot for cracking hashes☆18Apr 6, 2021Updated 4 years ago
- ☆16Jan 31, 2015Updated 11 years ago
- History and analysis of Windows desktop images☆19Jan 28, 2021Updated 5 years ago
- OWASP Mth3l3m3nt Framework is a penetration testing aiding tool and exploitation framework. It fosters a principle of attack the web usin…☆163Jan 21, 2021Updated 5 years ago
- GSAudit at Symantec, ExeAudit at RIM, RECX Binary Assurance for Windows at Recx etc. - core library now WinBinaryAudit☆24Jul 1, 2015Updated 10 years ago
- Python In The Middle : a Python implementation of MITM attacks.☆15Apr 17, 2015Updated 10 years ago
- PoC grabbing IP address behind a VPN - Based of https://github.com/diafygi/webrtc-ips, saves all found addresses for anyone who visits wi…☆36Feb 14, 2016Updated 10 years ago
- Tools developed to test the Redirect to SMB issue☆84Jun 2, 2015Updated 10 years ago
- Working Rsh Client With Bind/Reverse Shell☆19Sep 15, 2015Updated 10 years ago
- Wireless Reconnaissance And Intelligent Target Harvesting☆50Jul 17, 2016Updated 9 years ago
- Command line tool for scanning streams within office documents plus xor db attack☆127Sep 23, 2023Updated 2 years ago
- Plugins written for CVE-Search☆27Apr 16, 2021Updated 4 years ago
- USN to JSON☆22Apr 4, 2020Updated 5 years ago
- xlrd2 is a variant of xlrd that is actively maintained☆23Aug 1, 2024Updated last year
- OfficeBrute - brute force protected word documents☆23Feb 4, 2018Updated 8 years ago