xerohackcom / ChayaLinks
Advance Image Steganography
☆131Updated 3 years ago
Alternatives and similar repositories for Chaya
Users that are interested in Chaya are comparing it to the libraries listed below
Sorting:
- Shreder is a powerful multi-threaded SSH protocol password brute-force tool.☆210Updated last year
- Fast Modular Web Interfaces Bruteforcer☆228Updated 3 years ago
- A very fast and smart web directory and file enumeration tool written in C.☆143Updated last week
- Hyenae NG is an advanced cross-platform network packet generator and the successor of Hyenae. It features full network layer spoofing, pa…☆128Updated 2 years ago
- A tool for generating reverse shell payloads on the fly.☆141Updated 3 years ago
- An extensible, end-to-end encrypted reverse shell that works across networks without port forwarding.☆99Updated last month
- Windows offline filesystem hacking tool for Linux☆96Updated 3 years ago
- Python-Based Pentesting CLI Tool☆85Updated 2 years ago
- An extensible application for penetration testers and software developers to decode/encode data into various formats.☆106Updated last year
- D3Ext's Forward Shell☆120Updated last year
- An advanced multi-threaded, multi-client python reverse shell for hacking linux systems. There's still more work to do so feel free to he…☆229Updated 3 years ago
- GUI for Volatility forensics tool written in PyQT5☆60Updated 4 years ago
- ☆98Updated 3 years ago
- Ladon hacking Scanner for PowerShell, vulnerability / exploit / detection / MS17010/SmbGhost,Brute-Force SMB/IPC/WMI/NBT/SSH/FTP/MSSQL/MY…☆187Updated 3 months ago
- Devkit for building Metasploit-like consoles☆251Updated this week
- All Security Resource Collections Repos That I Published.☆124Updated 5 years ago
- With the help of this automated script, you will never lose track of recently released CVEs.☆52Updated 3 years ago
- 🚪 Quick & dirty Wordpress Command Execution Shell☆67Updated 3 years ago
- This little tool is to calculate a MurmurHash value of a favicon to hunt phishing websites on the Shodan platform.☆117Updated 2 years ago
- DNSrr is a tool written in bash, used to enumerate all the juicy stuff from DNS.☆121Updated 3 years ago
- 🔎 Help find Trojan Source vulnerability in code 👀 . Useful for code review in project with multiple collaborators (CI/CD)☆47Updated last year
- Steganograpy in Python | Hide files or data in Image Files☆172Updated 3 years ago
- Malware indetectable, with AV bypass techniques, anti-disassembly, etc.☆105Updated 5 years ago
- Automated Tool That Generates The Perfect Meterpreter Powershell Payload☆225Updated 4 years ago
- Bug's feed is a local hosted portal where you can search for the latest news, videos, CVEs, vulnerabilities...☆93Updated 3 years ago
- NSE scripts to detect CVE-2020-1350 SIGRED and CVE-2020-0796 SMBGHOST, CVE-2021-21972, proxyshell, CVE-2021-34473☆164Updated 4 years ago
- A simple Python script that reads a text file with lots of e-mails and passwords, and tries to check if those credentials are valid by tr…☆72Updated last year
- Proof of Concept (PoC) CVE-2021-4034☆97Updated 3 years ago
- Domain Parser for IPAddress.com Reverse IP Lookup☆83Updated 2 years ago
- A customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan.☆120Updated last year