netspooky / b64muteLinks
Base64 Mutator
☆13Updated 4 years ago
Alternatives and similar repositories for b64mute
Users that are interested in b64mute are comparing it to the libraries listed below
Sorting:
- LetMeOutOfYour.net Resources☆20Updated 5 years ago
 - Rosie the Pivoter☆17Updated 7 years ago
 - During pentesting I often miss screenshots of events for reports due to the quick pace of testing and a lack of foreknowledge about what …☆26Updated 6 years ago
 - My python3 implementation of a Forward Shell☆36Updated 6 years ago
 - Network Finger Printer☆16Updated 7 years ago
 - backdorOS is an in-memory OS written in Python 2.7 with a built-in in-memory filesystem, hooks for open() calls and imports, Python REPL …☆72Updated 6 years ago
 - Proof of concept communications from C# via a web browser process☆21Updated 6 years ago
 - A Canary which fires when uninstalled☆34Updated 4 years ago
 - C# User Simulation☆33Updated 3 years ago
 - wordlists for password cracking☆28Updated 3 years ago
 - various slides and presentations I've worked on☆19Updated 7 months ago
 - Hostile Dropboxes Management☆26Updated 5 years ago
 - Nmap and NSE command line wrapper in the style of Metasploit☆42Updated 3 years ago
 - s3eker is an extensible way to find open S3 buckets.☆17Updated 5 years ago
 - Encode binary as English text over HTTP(s)☆30Updated 2 years ago
 - DNS server for pentesters☆50Updated 3 years ago
 - The Multiplatform Linux Sandbox☆16Updated last year
 - Cross-Platform Reverse Socks Proxy in Go☆27Updated 2 years ago
 - Finding sensitive information in the trimmed parts of cropped images☆30Updated 3 years ago
 - Ansible scripts to build an attack box☆24Updated 7 years ago
 - Experimenting with destructive file attacks in Go☆18Updated 6 years ago
 - Capture all RabbitMQ messages being sent through a broker.☆32Updated 4 years ago
 - ☆11Updated 6 years ago
 - Test Azure environment for MFA misconfigurations☆12Updated 2 years ago
 - Fake SMB and SAMR data☆11Updated 6 years ago
 - C# utility that uses WMI to run "cmd.exe /c netstat -n", save the output to a file, then use SMB to read and delete the file remotely☆38Updated 5 years ago
 - Zone transfers for rwhois☆20Updated 6 years ago
 - The SSH Multiplex Backdoor Tool☆65Updated 6 years ago
 - Simple tool to extract the most common substrings from an input text. Built for password cracking.☆66Updated 5 years ago
 - The Cloud Blocker☆108Updated 8 months ago