mindcrypt / stegowiper
A powerful and flexible tool to apply active attacks for disrupting stegomalware
☆52Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for stegowiper
- It was developed to speed up the processes of SOC Analysts during analysis☆47Updated 7 months ago
- Highly configurable script for dictionary/spray attacks against online web applications.☆54Updated 2 years ago
- Enumeration & fingerprint tool☆23Updated 8 months ago
- Pivot your way deeper into computer networks with SSH compromised machines.☆62Updated 2 years ago
- Helping to automate payload development, testing, Opsec checking, beacon tasking, and deployment for Cobalt Strike☆52Updated 2 years ago
- Automate All Pivoting System Enumeration with this Bash Script☆11Updated 2 years ago
- Herramienta en Bash ideal para extraer la información más relevante de un dominio vía rpcclient.☆17Updated last year
- Windows Reverse TCP Shell for Hacking and Pentesting☆23Updated 2 months ago
- Rapid Deployment Infrastructure for Red Teaming and Penetration Testing☆42Updated 2 years ago
- Modular framework to exploit UPS devices☆61Updated last year
- 「💥」CVE-2022-33891 - Apache Spark Command Injection☆27Updated 2 years ago
- APK Infrastructure Investigator☆63Updated last year
- DNSrecon tool with GUI for Kali Linux☆56Updated last year
- This is a python script that exploits wget when being set with a SUID bit, and overwrites the root password.☆38Updated 7 months ago
- A project created with an aim to emulate and test exfiltration of data over different network protocols.☆30Updated last year
- MacroExploit use in excel sheet☆20Updated last year
- F5 BIG-IP Scanner scans for servers on shodan and checks to see if they are vulnerable.☆17Updated last year
- A folder to serve tools from during PT/Red Team engagements. Contains common executables and scripts for privesc, recon, pivoting and CVE…☆15Updated 7 months ago
- nistrich allows you to discover CVEs and their severities belong to IP addresses☆13Updated last year
- PowerSploit - A PowerShell Post-Exploitation Framework☆23Updated 2 years ago
- Ethical Remote Acces Tool Client and Server for W10 and Linux Persist functionality☆50Updated last year
- Associated-Threat-Analyzer detects malicious IPv4 addresses and domain names associated with your web application using local malicious d…☆37Updated last year
- EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicated…☆24Updated 2 years ago
- PAKURI-THON is a tool that supports pentesters with various pentesting tools and C4 server (command & control and chat & communication se…☆27Updated 2 years ago
- Cloud Exploit Framework☆112Updated 2 years ago
- Analyzing AD domains for security risks related to user accounts☆63Updated last year
- Tools used for Pentesting☆22Updated last year
- Central IoC scanner based on Loki☆20Updated 2 years ago
- ☆21Updated last year