☆42Apr 7, 2014Updated 12 years ago
Alternatives and similar repositories for steg-of-the-dump
Users that are interested in steg-of-the-dump are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Simple email chrome extension☆14Jul 12, 2015Updated 10 years ago
- Automate Auxiliary Module in Metasploit☆17Apr 18, 2021Updated 5 years ago
- OAuth Security Cheatsheet☆40May 12, 2014Updated 12 years ago
- Source code repository for Digital History Hacks☆24Jun 16, 2013Updated 12 years ago
- Details for past classes, including date/time, description, requirements, and IRC logs☆13Oct 17, 2017Updated 8 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Driverless two wheel drive car with an ultrasonic sound sensor to measure distance, a servo to move the sensor between three positions an…☆10Jul 27, 2019Updated 6 years ago
- Depending on the AV/EPP/EDR creating a Taskschedule Job with a default cradle is often flagged☆89Jul 7, 2022Updated 3 years ago
- Shell interface for teaching the socket API☆17Nov 27, 2025Updated 5 months ago
- time-based user enum via Basic Auth in Azure against Autodiscover☆34Oct 3, 2024Updated last year
- A JS/Node app that uses Backbone.js/React.js/Browserify to make it Isomorphic☆22Feb 17, 2015Updated 11 years ago
- ☆11Nov 6, 2023Updated 2 years ago
- ☆10Aug 11, 2025Updated 9 months ago
- A simple automation tool to detect lfi, rce and ssti vulnerability☆56Feb 15, 2022Updated 4 years ago
- Little java tool to decrypt passwords from Openfire embedded-db☆16Nov 14, 2015Updated 10 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- a simple powershell wrapper to automate checking a user's access around the network☆13Dec 5, 2023Updated 2 years ago
- This repository will contain source codes from the Tradecraft improvement blog series☆15Mar 27, 2025Updated last year
- python 2 arp poisonner☆15Sep 30, 2022Updated 3 years ago
- Totally Automatic LFI Exploiter (+ Reverse Shell) and Scanner☆12Apr 22, 2018Updated 8 years ago
- A permissively licensed, low-level, high-performance cryptographic hash library for hackers.☆27Jun 6, 2025Updated 11 months ago
- A tool to interact with Kerberos to request, forge and convert various types of tickets in an Active Directory environment.☆67Jun 10, 2025Updated 11 months ago
- Proof of Concept for CVE-2025-24367☆36Dec 8, 2025Updated 5 months ago
- Your small, but useful django log box. 📦☆19Sep 20, 2025Updated 8 months ago
- OpenLDAP password cracking☆23Mar 31, 2017Updated 9 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Draw a timeline of average frame colors in a video☆12Feb 20, 2020Updated 6 years ago
- ☆13Mar 23, 2023Updated 3 years ago
- Assorted scripts I made for Red Teaming / Pen Testing☆14Jun 15, 2024Updated last year
- ☆10Jul 8, 2024Updated last year
- ☆10Feb 20, 2026Updated 3 months ago
- Threat Hunt Investigation Methodology and Procedure☆15Jul 11, 2022Updated 3 years ago
- ☆13Jan 19, 2023Updated 3 years ago
- EvtPsst☆55Oct 24, 2023Updated 2 years ago
- CLI-based 802.11 Rogue (Fake) AP & Hidden AP Spotter☆14Dec 26, 2025Updated 4 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Notes and resources for the AD☆11Aug 2, 2022Updated 3 years ago
- An issue discovered in Telesquare TLR-2005Ksh 1.0.0 and 1.1.4 allows attackers to run arbitrary system commands via the Cmd parameter.☆17May 19, 2024Updated 2 years ago
- Honeybag helps you to create 'bait archive' with any folders and files, notify you if someone accesses it☆16Sep 30, 2020Updated 5 years ago
- 🚓 Crime dataset for the City of Buenos Aires, Argentina☆42Jul 11, 2022Updated 3 years ago
- Root-Me Badge Generator is a Python 3 script that generates badges from Root-me profiles.☆17Aug 9, 2020Updated 5 years ago
- Quick script to find info about a syscall in a target architecture☆18Jan 8, 2020Updated 6 years ago
- Defalyzer is a cross-platform software that focuses on defacement analyzing and mirror tracking.☆14Mar 10, 2022Updated 4 years ago