A powerful and flexible tool to apply active attacks for disrupting stegomalware
☆55Apr 28, 2022Updated 3 years ago
Alternatives and similar repositories for stegowiper
Users that are interested in stegowiper are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- bugBounty Scripts☆11Feb 3, 2023Updated 3 years ago
- Persistence techniques for windows.☆19Jun 26, 2023Updated 2 years ago
- nistrich allows you to discover CVEs and their severities belong to IP addresses☆13Dec 28, 2022Updated 3 years ago
- Automated Linux service that collects information on local Wi-Fi networks and performs deauthentication attacks.☆68Mar 4, 2023Updated 3 years ago
- Exploit ConnectWise ScreenConnect (bypass authentication)☆13Feb 21, 2024Updated 2 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- ☆16Jul 14, 2023Updated 2 years ago
- Pivot your way deeper into computer networks with SSH compromised machines.☆65Oct 18, 2022Updated 3 years ago
- A tool for steganography of png files .☆24Jul 27, 2022Updated 3 years ago
- Automate All Pivoting System Enumeration with this Bash Script☆13Nov 7, 2022Updated 3 years ago
- Simple Shellcode Runner in Rust Language☆18Dec 8, 2023Updated 2 years ago
- A tool that adds reproducible UUIDs to YARA rules☆13Apr 24, 2024Updated last year
- Extendable Python script handler for automating penetration testing.☆39Mar 3, 2023Updated 3 years ago
- Monitor your target continuously for new subdomains!☆25Mar 18, 2023Updated 3 years ago
- Malware Libraries focused in help Malware Development☆25Mar 20, 2023Updated 3 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A tool that removes traces of executed applications on Windows OS.☆122Sep 4, 2022Updated 3 years ago
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Nov 8, 2022Updated 3 years ago
- ☆132Jan 25, 2023Updated 3 years ago
- want to remove sensitive data from photos or even view it? use autoexif to easily help you do that no more remembering syntaxs with this …☆40Apr 23, 2025Updated 11 months ago
- Mitigation validation utility for the Ivanti Connect Around attack chain. Runs multiple checks. CVE-2023-46805, CVE-2024-21887.☆12Feb 3, 2024Updated 2 years ago
- Application for administer multidomain Active Directory-based networks☆29Dec 4, 2025Updated 4 months ago
- The long shadow to emerge as other Git repositories☆18Feb 25, 2026Updated last month
- D3Ext's Forward Shell☆120Oct 15, 2023Updated 2 years ago
- Scan websites CSP policies and visualise their vunlnerabilities from a dashboard☆13Mar 11, 2025Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- ☆12Sep 22, 2022Updated 3 years ago
- Making Shellcode fully undetectable using uuid☆23May 7, 2021Updated 4 years ago
- Simple Imager has been created for performing live acquisition of Windows based systems in a forensically sound manner☆30Feb 27, 2026Updated last month
- A project created with an aim to emulate and test exfiltration of data over different network protocols.☆31Mar 21, 2023Updated 3 years ago
- A High Performance PCRE Regex Package That Uses A Cache.☆12Oct 15, 2023Updated 2 years ago
- A collection of tools, notes, & resources I've created during my OSCP certification journey.☆10Apr 25, 2021Updated 4 years ago
- web network analyzer☆14Dec 3, 2023Updated 2 years ago
- Exploit for CVE-2024-3273, supports single and multiple hosts☆13Apr 7, 2024Updated 2 years ago
- Active Directory Password Spray Testing Utility in Go☆18Mar 22, 2024Updated 2 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Reverse And Dorking Tools☆26Apr 30, 2021Updated 4 years ago
- ☆13Dec 21, 2023Updated 2 years ago
- POC for utilizing wikipedia API for Command and Control☆28Dec 8, 2022Updated 3 years ago
- WindowSpy is a Cobalt Strike Beacon Object File meant for automated and targeted user surveillance.☆282Feb 24, 2025Updated last year
- tunnel port to port traffic over an obfuscated channel with AES-GCM encryption.☆68Nov 22, 2019Updated 6 years ago
- DNSrecon tool with GUI for Kali Linux☆60Dec 12, 2022Updated 3 years ago
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆36Jan 20, 2022Updated 4 years ago