mirror of
https://github.com/apsdehal/awesome-ctf
synced 2024-11-22 02:23:04 +00:00
Added StegCracker, stegextract and Raccoon (#82)
This commit is contained in:
parent
1a09a0b0c8
commit
9dae20d023
1 changed files with 3 additions and 0 deletions
|
@ -244,6 +244,8 @@ Check solve section for steganography.
|
|||
- [SmartDeblur](https://github.com/Y-Vladimir/SmartDeblur) - Used to deblur and fix defocused images
|
||||
- [Steganabara](https://www.openhub.net/p/steganabara) - Tool for stegano analysis written in Java
|
||||
- [Stegbreak](https://linux.die.net/man/1/stegbreak) - Launches brute-force dictionary attacks on JPG image
|
||||
- [StegCracker](https://github.com/Paradoxis/StegCracker) - Steganography brute-force utility to uncover hidden data inside files
|
||||
- [stegextract](https://github.com/evyatarmeged/stegextract) - Detect hidden files and text in images
|
||||
- [Steghide](http://steghide.sourceforge.net/) - Hide data in various kind of images
|
||||
- [Stegsolve](http://www.caesum.com/handbook/Stegsolve.jar) - Apply various steganography techniques to images
|
||||
|
||||
|
@ -256,6 +258,7 @@ Check solve section for steganography.
|
|||
- [Hackbar](https://addons.mozilla.org/en-US/firefox/addon/hackbar/) - Firefox addon for easy web exploitation
|
||||
- [OWASP ZAP](https://www.owasp.org/index.php/Projects/OWASP_Zed_Attack_Proxy_Project) - Intercepting proxy to replay, debug, and fuzz HTTP requests and responses
|
||||
- [Postman](https://chrome.google.com/webstore/detail/postman/fhbjgbiflinjbdggehcddcbncdddomop?hl=en) - Add on for chrome for debugging network requests
|
||||
- [Raccoon](https://github.com/evyatarmeged/Raccoon) - A high performance offensive security tool for reconnaissance and vulnerability scanning
|
||||
- [SQLMap](https://github.com/sqlmapproject/sqlmap) - Automatic SQL injection and database takeover tooli
|
||||
- [W3af](https://github.com/andresriancho/w3af) - Web Application Attack and Audit Framework.
|
||||
- [XSSer](http://xsser.sourceforge.net/) - Automated XSS testor
|
||||
|
|
Loading…
Reference in a new issue