Steganography Detection Framework
☆14Jan 8, 2025Updated last year
Alternatives and similar repositories for stegsleuth
Users that are interested in stegsleuth are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Generate an undetectable PE ( .exe ), which bypasses windows defender / AV☆133May 12, 2025Updated 11 months ago
- Phone: A Mobile Phone Forensic Framework ( Android )☆211Mar 22, 2025Updated last year
- A python-based vulnerability scanner designed to identify open redirect flaws in website applications.☆25Mar 15, 2026Updated last month
- ☆16Apr 17, 2025Updated last year
- Just another repository holding files of Shadow Brokers. Extracted myself.☆55Apr 9, 2017Updated 9 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ☆37Apr 16, 2026Updated 3 weeks ago
- SVG Cards for the Whot Game☆15Feb 11, 2018Updated 8 years ago
- Unity3D's Mathf port☆21Sep 2, 2022Updated 3 years ago
- This repo offers comprehensive information, necessary tools, and instructional videos for beginners in Android penetration testing, provi…☆23Jun 12, 2023Updated 2 years ago
- PyTorch Implementation for the paper "Let Me Help You! Neuro-Symbolic Short-Context Action Anticipation" accepted to RA-L'24.☆12Nov 27, 2024Updated last year
- A curated, verified list of AI-powered tools for smart contract and blockchain security☆68Apr 24, 2026Updated 2 weeks ago
- A cognitive playbook for experienced smart contract auditors. Structures audit thinking, exploration, validation, and reporting. Not an a…☆40Jan 23, 2026Updated 3 months ago
- Xmator is an advanced automation script that helps you intelligently clean up your following list on X (formerly Twitter). Unlike basic m…☆30Aug 5, 2025Updated 9 months ago
- This is a phishing ready platform. Unlike other phishing methods, EvilnoVNC allows you to bypass 2FA using a real browser via noVNC conn…☆10Apr 7, 2023Updated 3 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- 0xJS is an AI-powered JavaScript Security Tool☆57Apr 16, 2026Updated 3 weeks ago
- PhantomDroid is a CLI-based, all-in-one Android security assessment framework built in Python, designed for ethical hackers and professio…☆104Mar 3, 2026Updated 2 months ago
- ☆44May 4, 2025Updated last year
- SSL bypass check☆313Feb 8, 2026Updated 3 months ago
- Threat Hijacking Simple Implementation☆22Feb 24, 2025Updated last year
- AdminX it's a Malware to execute process as some users from a Windows OS☆10May 4, 2023Updated 3 years ago
- Largest Prompts Directory on internet - 10K+ Prompts | Veo3 | Databricks | Cursor | Manus | Same.dev | Lovable | Devin | Replit Agent | …☆130Jun 30, 2025Updated 10 months ago
- Exploit Development CheatSheet.☆18Aug 9, 2021Updated 4 years ago
- Burp extension to fuzz/brute force GenAI/LLM prompts for potential behvioural and Prompt Injection vulnerabilities.☆13Sep 3, 2025Updated 8 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- C++ keylogger to save all the keys pressed into a local txt file☆10Apr 6, 2023Updated 3 years ago
- Particle System forming 3d models and 2d images in three.js☆29Jul 15, 2017Updated 8 years ago
- 🗺️ 🧭 Explore complex software projects like the Linux Kernel or any arbitrary git repository☆71Apr 30, 2026Updated last week
- A high-performance Monero (XMR) mining implementation in C++ using the RandomX algorithm. This miner is optimized for modern CPUs and pro…☆62Mar 9, 2026Updated last month
- ☆18Aug 14, 2023Updated 2 years ago
- SSH Bruteforce Basic Script created with C++ to Linux☆10Jan 28, 2023Updated 3 years ago
- Linux Malware creator to attack Windows System via Reverse Shell with FindWindow Process Code Injection☆18Mar 18, 2023Updated 3 years ago
- all-in-one tool designed for creating, configuring, and deploying custom tokens☆20May 5, 2025Updated last year
- ☆17Jun 21, 2024Updated last year
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Post-Exploitation Tool to Steal MySQL Data, and with persistence extract all data from MySQL table every time that Windows are opened wit…☆14Apr 2, 2023Updated 3 years ago
- Web worker preloader☆26Sep 14, 2015Updated 10 years ago
- Simple C++ Reverse Shell☆12Nov 22, 2022Updated 3 years ago
- MITM to Capture FTP Credentials☆14Apr 27, 2022Updated 4 years ago
- Backend take-home project for Simplify☆10May 1, 2026Updated last week
- ☆446Jan 5, 2026Updated 4 months ago
- Wordlists for content discovery with special words in different languages☆15Jan 17, 2025Updated last year