A list of attacks or malware using steganography or information hiding
☆72Dec 15, 2025Updated 3 months ago
Alternatives and similar repositories for steg-in-the-wild
Users that are interested in steg-in-the-wild are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- As I work thought the book "Practical Binary Analysis" by Dennis Andriesse, https://practicalbinaryanalysis.com/ I try to make editions f…☆11Sep 28, 2021Updated 4 years ago
- Keystroke injection tool collection for 2.4 GHz wireless input devices☆24Oct 20, 2023Updated 2 years ago
- A web-based serverless application which works on a decentralized system for handling transactions between users ruling out the utilizati…☆13May 6, 2022Updated 3 years ago
- A small example how to connect the font to kivy app☆11Jun 2, 2014Updated 11 years ago
- Repository for the SecurityTube Linux Assembly Expert Certification☆10Oct 11, 2017Updated 8 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- A list of covert channels and steganography/steganalysis resources (books, papers & tools)☆101Jul 10, 2022Updated 3 years ago
- ☆10Apr 5, 2019Updated 6 years ago
- Shellcode Loader Engine for Windows☆27Jan 29, 2017Updated 9 years ago
- Get your Github statistics like stars, forks, lines changed and many more directly in a svg image. You can display that in your github pr…☆10Mar 18, 2026Updated last week
- DIY alternative to the very cool Flipper Zero project☆21Aug 4, 2022Updated 3 years ago
- Proof of concept for an anti-phishing browser plugin, working by comparing pages screenshots with perceptual hashing algorithms.☆10Apr 3, 2022Updated 3 years ago
- CVE-2024-4577 is a critical vulnerability in PHP affecting CGI configurations, allowing attackers to execute arbitrary commands via craft…☆79Jun 11, 2024Updated last year
- CredData is a set of files including credentials in open source projects. CredData includes suspicious lines with manual review results a…☆75Feb 17, 2026Updated last month
- A kernel mode Windows rootkit in development.☆49Dec 31, 2021Updated 4 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆25Jul 27, 2022Updated 3 years ago
- Learn To Receive, Parse and Transmit☆28Feb 11, 2025Updated last year
- simple demo of using C# & System.Management.Automation.dll to run powershell code (b64 encoded) without powershell.exe☆14Mar 29, 2017Updated 8 years ago
- چگونه فیدیبوک را در سال 1402 هک کنیم؟☆22Jan 21, 2023Updated 3 years ago
- Nessus Cheat Sheet in HTML, PDF, PNG, ADOC☆12Apr 10, 2022Updated 3 years ago
- PoC for DHCP vulnerability (NAME:WRECK) in FreeBSD☆15Apr 14, 2021Updated 4 years ago
- Automated NoSQL database enumeration and web application exploitation tool.☆25May 6, 2019Updated 6 years ago
- Collection of malware persistence and hunting information. Be a persistent persistence hunter!☆186Oct 3, 2025Updated 5 months ago
- Using ML techniques to detect and characterize DDoS traffic using the CIC_DDoS2019 dataset☆25Aug 27, 2022Updated 3 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Penetration Test / Read Team - C# tools repository☆55Dec 23, 2021Updated 4 years ago
- An Exploitation script developed to exploit the CVE-2023-4966 bleed citrix information disclosure vulnerability☆10Oct 29, 2023Updated 2 years ago
- ☆38Mar 3, 2025Updated last year
- Integration of Syntia program synthesis tool into the radare2 reverse engineering framework.☆21Dec 4, 2025Updated 3 months ago
- Build myself for cs project☆12Oct 29, 2020Updated 5 years ago
- Windows Antivirus Evasion and Memory Injection☆12Feb 19, 2022Updated 4 years ago
- Exploit POC for CVE-2024-22026 affecting Ivanti EPMM "MobileIron Core"☆15May 15, 2024Updated last year
- Collection Of Terrible CNC/Qbot Panels☆11Aug 8, 2025Updated 7 months ago
- NASM listing to shellcode converter☆14May 6, 2018Updated 7 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Port of Mandiant ShellcodeHashes plugin from IDA to BinaryNinja☆11Jul 24, 2024Updated last year
- ☆31Nov 1, 2022Updated 3 years ago
- This project is created for research into antivirus evasion by unhooking.☆18Sep 2, 2021Updated 4 years ago
- A folder to serve tools from during PT/Red Team engagements. Contains common executables and scripts for privesc, recon, pivoting and CVE…☆15Mar 15, 2024Updated 2 years ago
- NTP Scanner and 'monlist' checker☆13Sep 1, 2015Updated 10 years ago
- Beacon Object File implementation of Yaxser's Backstab☆15Mar 9, 2022Updated 4 years ago
- C# Implementation of Get-VaultCredential☆14Jul 31, 2018Updated 7 years ago