A powerful and flexible tool to apply active attacks for disrupting stegomalware
☆55Apr 28, 2022Updated 3 years ago
Alternatives and similar repositories for stegowiper
Users that are interested in stegowiper are comparing it to the libraries listed below
Sorting:
- bugBounty Scripts☆11Feb 3, 2023Updated 3 years ago
- Persistence techniques for windows.☆19Jun 26, 2023Updated 2 years ago
- Pivot your way deeper into computer networks with SSH compromised machines.☆65Oct 18, 2022Updated 3 years ago
- Extendable Python script handler for automating penetration testing.☆39Mar 3, 2023Updated 3 years ago
- want to remove sensitive data from photos or even view it? use autoexif to easily help you do that no more remembering syntaxs with this …☆39Apr 23, 2025Updated 10 months ago
- ☆132Jan 25, 2023Updated 3 years ago
- Automated Linux service that collects information on local Wi-Fi networks and performs deauthentication attacks.☆67Mar 4, 2023Updated 2 years ago
- Monitor your target continuously for new subdomains!☆25Mar 18, 2023Updated 2 years ago
- Simple Imager has been created for performing live acquisition of Windows based systems in a forensically sound manner☆30Oct 28, 2025Updated 4 months ago
- Exploit for CVE-2024-3273, supports single and multiple hosts☆13Apr 7, 2024Updated last year
- Scan websites CSP policies and visualise their vunlnerabilities from a dashboard☆13Mar 11, 2025Updated 11 months ago
- A tool that adds reproducible UUIDs to YARA rules☆13Apr 24, 2024Updated last year
- A High Performance PCRE Regex Package That Uses A Cache.☆12Oct 15, 2023Updated 2 years ago
- Mitigation validation utility for the Ivanti Connect Around attack chain. Runs multiple checks. CVE-2023-46805, CVE-2024-21887.☆12Feb 3, 2024Updated 2 years ago
- Exploit ConnectWise ScreenConnect (bypass authentication)☆13Feb 21, 2024Updated 2 years ago
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Nov 8, 2022Updated 3 years ago
- A project created with an aim to emulate and test exfiltration of data over different network protocols.☆31Mar 21, 2023Updated 2 years ago
- D3Ext's Forward Shell☆120Oct 15, 2023Updated 2 years ago
- Application for administer multidomain Active Directory-based networks☆29Dec 4, 2025Updated 2 months ago
- A tool that removes traces of executed applications on Windows OS.☆122Sep 4, 2022Updated 3 years ago
- An Open Source Intelligence Framework to investigate and keep track of the investigation of a certain individual☆17Aug 30, 2023Updated 2 years ago
- web network analyzer☆14Dec 3, 2023Updated 2 years ago
- ☆13Dec 21, 2023Updated 2 years ago
- A BurpSuite extension for vulnerability Scanning☆29Feb 16, 2024Updated 2 years ago
- Powershell Scripts for Blue Team members☆11Dec 1, 2023Updated 2 years ago
- 24/7 music to focus, work and relax☆12Jan 26, 2023Updated 3 years ago
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆36Jan 20, 2022Updated 4 years ago
- ☆12Sep 22, 2022Updated 3 years ago
- Simple Shellcode Runner in Rust Language☆18Dec 8, 2023Updated 2 years ago
- nistrich allows you to discover CVEs and their severities belong to IP addresses☆13Dec 28, 2022Updated 3 years ago
- DNSrecon tool with GUI for Kali Linux☆60Dec 12, 2022Updated 3 years ago
- Url scrapper or extractor from alienvault☆38Mar 1, 2025Updated last year
- Seekolver is a tool focused on attack-surface mapping. It performs searches for subdomains associated with root domains and root domains …☆40Dec 11, 2023Updated 2 years ago
- Active Directory Password Spray Testing Utility in Go☆18Mar 22, 2024Updated last year
- golang实现的PE解析工具☆15Nov 15, 2022Updated 3 years ago
- ☆15Apr 5, 2023Updated 2 years ago
- Sabonis, a Digital Forensics and Incident Response pivoting tool☆18Mar 3, 2022Updated 4 years ago
- ☆16Jul 14, 2023Updated 2 years ago
- Post-Infection Collection Toolkit☆95Jan 31, 2023Updated 3 years ago