xerohackcom / ChayaLinks
Advance Image Steganography
☆132Updated 3 years ago
Alternatives and similar repositories for Chaya
Users that are interested in Chaya are comparing it to the libraries listed below
Sorting:
- Shreder is a powerful multi-threaded SSH protocol password brute-force tool.☆209Updated last year
- Fast Modular Web Interfaces Bruteforcer☆228Updated 3 years ago
- A tool for generating reverse shell payloads on the fly.☆143Updated 3 years ago
- Python-Based Pentesting CLI Tool☆84Updated 2 years ago
- An extensible, end-to-end encrypted reverse shell that works across networks without port forwarding.☆99Updated 2 weeks ago
- An advanced multi-threaded, multi-client python reverse shell for hacking linux systems. There's still more work to do so feel free to he…☆229Updated 3 years ago
- D3Ext's Forward Shell☆120Updated last year
- Windows offline filesystem hacking tool for Linux☆96Updated 3 years ago
- An extensible application for penetration testers and software developers to decode/encode data into various formats.☆105Updated last year
- A very fast and smart web directory and file enumeration tool written in C.☆143Updated 3 weeks ago
- With the help of this automated script, you will never lose track of recently released CVEs.☆53Updated 3 years ago
- Steganograpy in Python | Hide files or data in Image Files☆173Updated 3 years ago
- ☆98Updated 3 years ago
- 🚪 Quick & dirty Wordpress Command Execution Shell☆67Updated 3 years ago
- All Security Resource Collections Repos That I Published.☆126Updated 5 years ago
- GUI for Volatility forensics tool written in PyQT5☆60Updated 4 years ago
- This little tool is to calculate a MurmurHash value of a favicon to hunt phishing websites on the Shodan platform.☆118Updated 2 years ago
- Yet another content discovery tool☆119Updated 10 months ago
- Penetration Testing and Hacking CTF's Swiss Army Knife with: Reverse Shell Handling - Encoding/Decoding - Encryption/Decryption - Crackin…☆403Updated last month
- Bug's feed is a local hosted portal where you can search for the latest news, videos, CVEs, vulnerabilities...☆93Updated 3 years ago
- Domain Parser for IPAddress.com Reverse IP Lookup☆83Updated 2 years ago
- 🔎 Help find Trojan Source vulnerability in code 👀 . Useful for code review in project with multiple collaborators (CI/CD)☆47Updated last year
- Ladon hacking Scanner for PowerShell, vulnerability / exploit / detection / MS17010/SmbGhost,Brute-Force SMB/IPC/WMI/NBT/SSH/FTP/MSSQL/MY…☆186Updated 4 months ago
- Hyenae NG is an advanced cross-platform network packet generator and the successor of Hyenae. It features full network layer spoofing, pa…☆127Updated 2 years ago
- Devkit for building Metasploit-like consoles☆251Updated last week
- DNSrr is a tool written in bash, used to enumerate all the juicy stuff from DNS.☆119Updated 3 years ago
- Exploits project Hacking Command Center☆50Updated 2 years ago
- Vulnerable Client-Server Application (VuCSA) is made for learning how to perform penetration tests of non-http thick clients. It is writt…☆98Updated 2 years ago
- extensible exploitation framework shipped on a modular multi-tasking architecture☆78Updated 2 years ago
- NSE scripts to detect CVE-2020-1350 SIGRED and CVE-2020-0796 SMBGHOST, CVE-2021-21972, proxyshell, CVE-2021-34473☆163Updated 4 years ago