☆42Apr 7, 2014Updated 11 years ago
Alternatives and similar repositories for steg-of-the-dump
Users that are interested in steg-of-the-dump are comparing it to the libraries listed below
Sorting:
- Automate Auxiliary Module in Metasploit☆17Apr 18, 2021Updated 4 years ago
- OAuth Security Cheatsheet☆41May 12, 2014Updated 11 years ago
- A Docker-powered NodeJS sandbox to execute untrusted python code.☆10Jun 30, 2018Updated 7 years ago
- Tool to read and translate morse code from picture.☆19Aug 11, 2020Updated 5 years ago
- Driverless two wheel drive car with an ultrasonic sound sensor to measure distance, a servo to move the sensor between three positions an…☆10Jul 27, 2019Updated 6 years ago
- A Geographical Information System, workbench and repository to retrieve, collect, create, enrich and preserve historical temporalized spa…☆18Dec 4, 2024Updated last year
- Depending on the AV/EPP/EDR creating a Taskschedule Job with a default cradle is often flagged☆89Jul 7, 2022Updated 3 years ago
- Shell interface for teaching the socket API☆17Nov 27, 2025Updated 3 months ago
- How to install and use the Firebase Command Line Interface (CLI)☆11Mar 25, 2020Updated 5 years ago
- ☆10Aug 11, 2025Updated 7 months ago
- A simple automation tool to detect lfi, rce and ssti vulnerability☆56Feb 15, 2022Updated 4 years ago
- Decrypts blowfish (w. static key) encrypted hMail database password.☆15Feb 21, 2018Updated 8 years ago
- Little java tool to decrypt passwords from Openfire embedded-db☆16Nov 14, 2015Updated 10 years ago
- a simple powershell wrapper to automate checking a user's access around the network☆13Dec 5, 2023Updated 2 years ago
- This repository will contain source codes from the Tradecraft improvement blog series☆15Mar 27, 2025Updated 11 months ago
- Archive des épreuves du FCSC 2022 en attendant une version officielle de l'ANSSI☆10Jun 11, 2022Updated 3 years ago
- Proof of Concept for CVE-2025-24367☆34Dec 8, 2025Updated 3 months ago
- A web utility for picking things, at random.☆14Jan 10, 2019Updated 7 years ago
- Proyecto de visualización de estadísticas sobre nombres de nacimientos argentinos de 1922 a 2015☆11Oct 1, 2020Updated 5 years ago
- Draw a timeline of average frame colors in a video☆12Feb 20, 2020Updated 6 years ago
- ☆13Mar 23, 2023Updated 2 years ago
- Assorted scripts I made for Red Teaming / Pen Testing☆14Jun 15, 2024Updated last year
- BIXI is a fast, stable, and powerful DDoS tool designed for efficiency. It supports multiple protocols including TCP, UDP, ICMP, HTTP, an…☆10Apr 9, 2025Updated 11 months ago
- A toolkit for analyzing gendered language across sets of documents☆12Sep 24, 2021Updated 4 years ago
- Lord of SQL Injection (주석은 한글로 작성되어 있습니다. / Comments were written in Korean!)☆14Aug 22, 2017Updated 8 years ago
- Simple TKinter GUI tool written in Python to facilitate some basic audio and video manipulations using ffmpeg☆12Aug 3, 2022Updated 3 years ago
- ☆12Dec 10, 2020Updated 5 years ago
- ☆13Jan 19, 2023Updated 3 years ago
- EvtPsst☆55Oct 24, 2023Updated 2 years ago
- ☆10Aug 14, 2023Updated 2 years ago
- CLI-based 802.11 Rogue (Fake) AP & Hidden AP Spotter☆14Dec 26, 2025Updated 2 months ago
- Notes and resources for the AD☆11Aug 2, 2022Updated 3 years ago
- An issue discovered in Telesquare TLR-2005Ksh 1.0.0 and 1.1.4 allows attackers to run arbitrary system commands via the Cmd parameter.☆18May 19, 2024Updated last year
- ☆12Jan 31, 2020Updated 6 years ago
- Honeybag helps you to create 'bait archive' with any folders and files, notify you if someone accesses it☆16Sep 30, 2020Updated 5 years ago
- Some Cheat Sheet for Red Team☆18Dec 30, 2022Updated 3 years ago
- 🚓 Crime dataset for the City of Buenos Aires, Argentina☆42Jul 11, 2022Updated 3 years ago
- Resources to accelerate deployment of bots to aide with an influx of COVID related questions☆16May 20, 2020Updated 5 years ago
- Stack Based buffer overflow attack☆20Nov 25, 2023Updated 2 years ago