operatorequals / chmod-stego
A PoC on passing data through UNIX file privilege bits (RWX Triplets)
☆27Updated 7 years ago
Alternatives and similar repositories for chmod-stego:
Users that are interested in chmod-stego are comparing it to the libraries listed below
- ☆15Updated 8 years ago
- a radare2 plugin that decodes packets with Scapy☆33Updated 7 years ago
- proof of concept to backdoor files from owncloud encryption module☆18Updated 9 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- spectrum monitoring system for GSM providers☆44Updated 9 years ago
- NAT Pinning test suite tool for penetration testers.☆30Updated 11 years ago
- NSA EquationGroup C&C Hunter using the Shodan API☆28Updated 9 years ago
- Misc PoCs for various research topics☆21Updated 2 years ago
- Platform for Browser Exploitation☆34Updated 10 years ago
- Python library created while solving the Matasano Cryptopals challenges☆17Updated 3 years ago
- Here comes the paintrain!☆11Updated 8 years ago
- ☆20Updated 8 years ago
- ☆16Updated 9 years ago
- Swiss Army knife for raw bytes manipulation & interception☆55Updated last year
- Usefull snippets / Computer-security oriented☆21Updated 7 years ago
- Tools for MITMing Yahoo! Mail with a Wifi Pineapple Mark V and Flash☆28Updated 8 years ago
- Mobile Application Vulnerability Detection☆12Updated 7 years ago
- CANAPE Network Testing Tool☆33Updated 6 years ago
- Exploit Reliability Testing System☆34Updated 9 years ago
- Format string exploit generation☆10Updated 9 years ago
- Simple web app for displaying cowrie data in your browser☆12Updated 8 years ago
- Get detailed information about a Twitter user activity☆17Updated 7 years ago
- Example code for following along with my "Broken, Abandoned, and Forgotten Code" blog series☆25Updated 6 years ago
- A small wriiteup and a PoC tool about how to use SO_REUSADDR for firewall evasion☆25Updated 9 years ago
- Material from our CANAPE workshop☆32Updated 6 years ago
- Test for leaking DNS queries (i.e. if you're on a VPN)☆21Updated 10 years ago
- ANWI - All New Wireless IDS☆27Updated 5 years ago
- ☆26Updated 4 years ago
- Windows Crypt API hook to generate weak keys☆48Updated 8 years ago
- Reverse Engineering and Exploit Development stuff☆31Updated 7 years ago