A list of attacks or malware using steganography or information hiding
☆72Dec 15, 2025Updated 4 months ago
Alternatives and similar repositories for steg-in-the-wild
Users that are interested in steg-in-the-wild are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- NTS proof of concept in Python☆10Jan 1, 2023Updated 3 years ago
- Keystroke injection tool collection for 2.4 GHz wireless input devices☆24Oct 20, 2023Updated 2 years ago
- Repository for the SecurityTube Linux Assembly Expert Certification☆10Oct 11, 2017Updated 8 years ago
- A python RCE exploit on QNAP-QTS☆15Sep 15, 2020Updated 5 years ago
- A list of covert channels and steganography/steganalysis resources (books, papers & tools)☆103Jul 10, 2022Updated 3 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- The Frida Scripts Fetcher & Exploiter tool helps you search and use those scripts to exploit based on the provided search keyword.☆18Aug 5, 2023Updated 2 years ago
- A free online class on network information hiding/steganography/covert channels.☆110Mar 14, 2026Updated last month
- My modern disassemblies of paleolithic (DOS-era) malware!☆13Mar 24, 2026Updated last month
- Proof of concept for an anti-phishing browser plugin, working by comparing pages screenshots with perceptual hashing algorithms.☆10Apr 3, 2022Updated 4 years ago
- Minimal PS4 5.05 jailbreak on a ESP8266. Compiles in the Arduino IDE.☆17Jan 4, 2022Updated 4 years ago
- DUQU MALWARE SOURCE + BINARY + More coming☆14Feb 6, 2023Updated 3 years ago
- AdminX it's a Malware to execute process as some users from a Windows OS☆10May 4, 2023Updated 3 years ago
- simple demo of using C# & System.Management.Automation.dll to run powershell code (b64 encoded) without powershell.exe☆14Mar 29, 2017Updated 9 years ago
- Tool for obtaining information about PPL processes☆16Feb 12, 2024Updated 2 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Nessus Cheat Sheet in HTML, PDF, PNG, ADOC☆12Apr 10, 2022Updated 4 years ago
- PoC for DHCP vulnerability (NAME:WRECK) in FreeBSD☆15Apr 14, 2021Updated 5 years ago
- Collection of malware persistence and hunting information. Be a persistent persistence hunter!☆186Mar 31, 2026Updated last month
- Penetration Test / Read Team - C# tools repository☆55Dec 23, 2021Updated 4 years ago
- ☆38Mar 3, 2025Updated last year
- Windows Antivirus Evasion and Memory Injection☆12Feb 19, 2022Updated 4 years ago
- Convert kirbi ticket from mimikatz into hashcat format to crack it☆13Mar 5, 2019Updated 7 years ago
- ☆66Jan 27, 2023Updated 3 years ago
- Collection Of Terrible CNC/Qbot Panels☆11Aug 8, 2025Updated 8 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Exploit POC for CVE-2024-22026 affecting Ivanti EPMM "MobileIron Core"☆14May 15, 2024Updated last year
- NASM listing to shellcode converter☆14May 6, 2018Updated 8 years ago
- Android app to set an static ARP entry on the gateway's MAC address when you connect to a WIFI network☆11Nov 23, 2012Updated 13 years ago
- PoC for hiding processes from Windows Task Manager by manipulating the graphic interface☆47May 4, 2020Updated 6 years ago
- Port of Mandiant ShellcodeHashes plugin from IDA to BinaryNinja☆11Jul 24, 2024Updated last year
- This project is created for research into antivirus evasion by unhooking.☆18Sep 2, 2021Updated 4 years ago
- VCrypture is an online service that allows you to encrypt your secret images safely using visual cryptographic algorithms.☆22Aug 13, 2020Updated 5 years ago
- NTP Scanner and 'monlist' checker☆13Sep 1, 2015Updated 10 years ago
- Beacon Object File implementation of Yaxser's Backstab☆15Mar 9, 2022Updated 4 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Materials for CVE-2024-30052.☆12Oct 4, 2024Updated last year
- windows内核安全与驱动开发代码☆12Apr 4, 2020Updated 6 years ago
- Assembly API block that uses CRC32 for resolving Windows API function addresses☆18May 19, 2023Updated 2 years ago
- Starter application demonstrating how to connect a NestJS API to a PlanetScale MySQL database☆11Apr 12, 2023Updated 3 years ago
- Example of C# heap injector for x64 and x86 shellcodes☆14Jan 1, 2023Updated 3 years ago
- Red teaming cheatsheet for Windows Active Directory environments, featuring a meticulously curated cheatsheet that transcends traditional…☆14Apr 6, 2026Updated 3 weeks ago
- Progress OpenEdge Authentication Bypass☆16Mar 6, 2024Updated 2 years ago