Insiderer looks inside files for metadata and hidden content
☆37May 11, 2015Updated 10 years ago
Alternatives and similar repositories for insiderer
Users that are interested in insiderer are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- pwning & info gathering via user browser☆39May 7, 2015Updated 10 years ago
- Packet Knock-Out is an exploration in a method of data exfiltration via packet port numbers.☆14Sep 18, 2016Updated 9 years ago
- This script is used for extracting DDE in docx and xlsx☆12Dec 8, 2017Updated 8 years ago
- PoC to tunnel the Meterpreter reverse HTTP shell over RDP Virtual Channels☆67Feb 23, 2015Updated 11 years ago
- Tools developed to test the Redirect to SMB issue☆84Jun 2, 2015Updated 10 years ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Terminal Ip Lookup Tool☆56May 16, 2014Updated 11 years ago
- unarcrypto is an educational tool to depict cryptography usage in zip, rar and 7zip archives☆97Nov 10, 2018Updated 7 years ago
- DocBleachShell is the integration of the great DocBleach, https://github.com/docbleach/DocBleach Content Disarm and Reconstruction tool i…☆21Jan 15, 2022Updated 4 years ago
- simple tcp port scanner + banner grabber☆15Apr 10, 2024Updated 2 years ago
- An environment for comprehensive, automated analysis of web-based exploits, based on Cuckoo sandbox.☆124Aug 10, 2015Updated 10 years ago
- Differential Analysis of Malware in Memory☆216Apr 16, 2017Updated 8 years ago
- This is a tiny Chrome Extension that protects your from Clipboard XSS Attacks☆19Mar 30, 2015Updated 11 years ago
- ☆12May 9, 2017Updated 8 years ago
- Pure python, SSL/TLS protocol and cipher scanner/enumerator.☆27Jun 16, 2025Updated 9 months ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- My collection of exploit development skeletons for fuzzing, overwriting the stack, remote code execution, etc.☆16Mar 19, 2025Updated last year
- Archive Mirror for recently republished PoC/Exploit code☆17Nov 26, 2017Updated 8 years ago
- A duckyscript compatible Pi-Zero project, which utilises nmap - in particular the OS Detection features - to trigger OS-specific payloads…☆16Nov 29, 2016Updated 9 years ago
- History and analysis of Windows desktop images☆19Jan 28, 2021Updated 5 years ago
- GSAudit at Symantec, ExeAudit at RIM, RECX Binary Assurance for Windows at Recx etc. - core library now WinBinaryAudit☆23Jul 1, 2015Updated 10 years ago
- An open source real-time network topology and protocols analyzer☆29Feb 22, 2017Updated 9 years ago
- Offline Digital Forensics Tool for Binary Files☆38Nov 6, 2017Updated 8 years ago
- an experimental linux kernel module (rootkit) with a keylogger and built-in IRC bot☆57May 1, 2015Updated 10 years ago
- Published Articles of the Past (trying to be as complete as possible)☆15Jan 20, 2021Updated 5 years ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- A fully featured malware scanner for Linux desktops and servers.☆70May 18, 2022Updated 3 years ago
- Plugins written for CVE-Search☆27Apr 16, 2021Updated 4 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Jun 8, 2017Updated 8 years ago
- Simple apt package cache for use with Docker☆13Oct 19, 2019Updated 6 years ago
- Auto Domain Admin and Network Exploitation.☆298Dec 21, 2017Updated 8 years ago
- Automatically exported from code.google.com/p/pac4mac☆40Mar 4, 2019Updated 7 years ago
- Interactive Virtual Machine Introspection☆18Sep 27, 2017Updated 8 years ago
- Ransack Post Exploitation Tool☆16May 3, 2016Updated 9 years ago
- A Docker app to dump RDS databases to disk, using the latest RDS snapshot rather than the live DB instance.☆11Jun 5, 2018Updated 7 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- OWASP Mth3l3m3nt Framework is a penetration testing aiding tool and exploitation framework. It fosters a principle of attack the web usin…☆164Jan 21, 2021Updated 5 years ago
- find public zombie hosts for idle scanning, using shodan search and nmap☆24Feb 13, 2015Updated 11 years ago
- DRDoS UDP amplification tool☆17Jul 2, 2015Updated 10 years ago
- OfficeBrute - brute force protected word documents☆23Feb 4, 2018Updated 8 years ago
- An automated script that download potential exploit for linux kernel from exploitdb, and compile them automatically☆496Sep 21, 2021Updated 4 years ago
- Command line tool for scanning streams within office documents plus xor db attack☆127Sep 23, 2023Updated 2 years ago
- JynxKit is an LD_PRELOAD userland rootkit for Linux systems with reverse connection SSL backdoor☆60Dec 15, 2012Updated 13 years ago