Skip to content
#

ethical-hacking-tools

Here are 243 public repositories matching this topic...

It embeds the executable file or payload inside the jpg file. The method the program uses isn't exactly called one of the steganography methods. For this reason, it does not cause any distortion in the JPG file. The JPG file size and payload do not have to be proportional.The JPG file is displayed normally in any viewing application or web appli…

  • Updated Jun 17, 2022
  • Python
petep

PETEP (PEnetration TEsting Proxy) is an open-source Java application for traffic analysis & modification using TCP/UDP proxies. PETEP is a useful tool for performing penetration tests of applications with various application protocols. ⚡

  • Updated Dec 1, 2023
  • Java
pentesting-framework

A command-line interface (CLI) based passive subdomain discovery utility. It is designed to efficiently identify known subdomains of given domains by tapping into a multitude of curated online passive sources.

  • Updated Apr 29, 2024
  • Go

HTML smuggling is a malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web page. The malicious script decodes and deploys the payload on the targeted device when the victim opens/clicks the HTML attachment/link. The HTML smuggling technique leverages legitimate HTML5 and Ja…

  • Updated Jun 20, 2022
  • Python

Improve this page

Add a description, image, and links to the ethical-hacking-tools topic page so that developers can more easily learn about it.

Curate this topic

Add this topic to your repo

To associate your repository with the ethical-hacking-tools topic, visit your repo's landing page and select "manage topics."

Learn more