optiv / netneedleLinks
Network based steganography based control channels and chat.
☆8Updated 9 years ago
Alternatives and similar repositories for netneedle
Users that are interested in netneedle are comparing it to the libraries listed below
Sorting:
- A recon-ng module for crawling Indeed.com for contacts and resumes.☆12Updated 9 years ago
- Repo to store Windows PE's and Utilities for easy access.☆16Updated 4 years ago
- Python library for image hashing and deduplication☆11Updated 9 years ago
- module for certexfil☆15Updated 3 years ago
- Vulnerable XSLT Console Application☆10Updated 7 years ago
- All TMF files that I extracted from Microsoft PDBs.☆13Updated 6 years ago
- Reddit domain search module for Recon-ng☆10Updated 7 years ago
- Virtual host brute forcer☆22Updated 11 years ago
- A simple useless rootkit for the linux kernel. It is a kernel module which hooks up the open() syscall (or potentially any syscall) to re…☆12Updated 9 years ago
- Automatic generator of YARA modules based in protocol buffers☆16Updated 5 months ago
- smtp-user-enum.pl ported into a recon-ng module.☆9Updated 11 years ago
- Developper-proof prevention of SQL injection (java library)☆11Updated 4 years ago
- How to write inline c# in xaml☆8Updated 11 years ago
- Chrome extension to extract data from websites surfed inside of chrome☆18Updated 10 years ago
- Work files for my blog post "Code Caving in a PE file.☆17Updated 8 years ago
- A tool to visually snapshot a website by supplying multiple user-agent. Designed to aid in discovery of different entry points into an ap…☆31Updated 9 years ago
- A Python based backdoor that uses Steganography and a Cloud Image Service as a command and control server.☆26Updated 8 years ago
- pure Python binary analysis framework☆23Updated 6 years ago
- Windows SSPI wrapper in prue python☆15Updated last year
- Brute-force script for finding azorult XOR key.☆14Updated 6 years ago
- xlrd2 is a variant of xlrd that is actively maintained☆23Updated 11 months ago
- This script will pull and analyze syscalls in given application(s) allowing for easier security research purposes☆21Updated 4 years ago
- The hidden mstsc recorder player☆29Updated 5 years ago
- A port scanner written in PowerShell☆13Updated 4 years ago
- windows-operating-system-archaeology @Enigma0x3 @subTee☆46Updated 8 years ago
- Using Shodan to get a breakdown of the most common key names in public Redis servers.☆13Updated 7 years ago
- Collection of malware ioc hashes from blog posts. A Python script is provided to search through it.☆17Updated 4 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 8 years ago
- Rex library for various exploitation helpers☆22Updated 2 months ago
- Python script to scan for weak CBC ciphers, weak MAC algorithms and support auth methods.☆17Updated 9 years ago