Zero-Width Space Steganography, encodes/decodes hidden messages as non printable/readable characters.
☆153Feb 13, 2025Updated last year
Alternatives and similar repositories for zwsp-steg-js
Users that are interested in zwsp-steg-js are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Windows LNK/URL shortcut auto-binding hotkey (not a bug, feature)☆30Mar 22, 2018Updated 8 years ago
- Privilege Escilation training project, with an emphasis on the distinction between vulnerability research & it's exposure and exploitatio…☆35Nov 26, 2016Updated 9 years ago
- XSS in pastebin.com and reddit.com via unsanitized markdown output☆88Apr 24, 2018Updated 8 years ago
- Fuzzing Framework☆10Oct 23, 2017Updated 8 years ago
- PHP LockIt Deobfuscator☆10Nov 3, 2015Updated 10 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Repository for my talk on Desktop Bridge at Zer0Con 2018.☆33Mar 30, 2018Updated 8 years ago
- No one writes dumb malware anymore. This is a repo for dumb malware.☆10Apr 18, 2017Updated 9 years ago
- PoC Reverse Text segment ELF File infector☆14Feb 28, 2020Updated 6 years ago
- A tool that can help detect and takeover subdomains with dead DNS records☆12Aug 23, 2018Updated 7 years ago
- Disassembling binaries to neat asm sources.☆20Feb 5, 2018Updated 8 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆96Mar 7, 2018Updated 8 years ago
- A POSIX-compliant, fully automated WPA PSK PMKID and handshake capture script aimed at penetration testing☆368Aug 24, 2025Updated 8 months ago
- Demonstrating why Dynamic Method Invocation with unrestricted method names (the old default of Struts) is dangerous.☆12Sep 30, 2018Updated 7 years ago
- Post-exploitation scripts for OS X persistence and privesc☆73Apr 12, 2017Updated 9 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- A playground to practice SSRF Attacks against web apps☆17Oct 15, 2018Updated 7 years ago
- ☆86Feb 28, 2017Updated 9 years ago
- ☆22Jul 7, 2017Updated 8 years ago
- ☆16Mar 4, 2019Updated 7 years ago
- Tool written in python3 to determine where the AV signature is located in a binary/payload☆315Mar 24, 2018Updated 8 years ago
- Simple webinterface combining different recon tools.☆12Mar 2, 2018Updated 8 years ago
- Stealing CSRF tokens with CSS injection (without iFrames)☆324Feb 7, 2018Updated 8 years ago
- An interactive OOB XXE data exfiltration tool☆92May 31, 2017Updated 8 years ago
- Enumerate usernames on a domain where you have no creds by using SMB Relay with low priv.☆400May 20, 2020Updated 6 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Burp extension to decode NTLM SSP headers and extract domain/host information☆31Mar 11, 2021Updated 5 years ago
- Automatically exported from code.google.com/p/unix-security-file-parser☆34Dec 21, 2015Updated 10 years ago
- Windows payload written in C++, gives total control to the infected machine via reverse-TCP sockets from a web application☆17Feb 10, 2017Updated 9 years ago
- LetMeOutOfYour.net Resources☆21Apr 11, 2026Updated last month
- Journey to conquer the OSCP!☆13Apr 18, 2019Updated 7 years ago
- put this here because archival reasons.☆28Feb 18, 2018Updated 8 years ago
- Run Swing based GUI application within the Docker container through the Jetbrains Projector, and access it from browsers.☆18Apr 10, 2021Updated 5 years ago
- Reverse shell container for k8s deployments☆49Feb 21, 2020Updated 6 years ago
- ☆37Apr 30, 2020Updated 6 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Python script to check GitHub accounts for world-editable wiki pages☆21May 8, 2023Updated 3 years ago
- Perform Static and dynamic analysis on 32 bit ELF binary, and automate the process of stack based overflow exploitation.☆46Aug 18, 2019Updated 6 years ago
- ☆16May 6, 2015Updated 11 years ago
- packetstormsecurity.net exploit archive 133ch3r☆24Feb 22, 2011Updated 15 years ago
- Heap implementation for some JavaScript VM☆27Apr 8, 2015Updated 11 years ago
- A password cracking IRC bot☆18May 24, 2014Updated 11 years ago
- Decode the cookies set by balancer F5, and disclousure all pool ip☆78Oct 26, 2019Updated 6 years ago