4osp3l / stegsleuthView external linksLinks
Steganography Detection Framework
☆13Jan 8, 2025Updated last year
Alternatives and similar repositories for stegsleuth
Users that are interested in stegsleuth are comparing it to the libraries listed below
Sorting:
- Generate an undetectable PE ( .exe ), which bypasses windows defender / AV☆129May 12, 2025Updated 9 months ago
- Phone: A Mobile Phone Forensic Framework ( Android )☆209Mar 22, 2025Updated 10 months ago
- PyTorch Implementation for the paper "Let Me Help You! Neuro-Symbolic Short-Context Action Anticipation" accepted to RA-L'24.☆12Nov 27, 2024Updated last year
- Burp extension to fuzz/brute force GenAI/LLM prompts for potential behvioural and Prompt Injection vulnerabilities.☆13Sep 3, 2025Updated 5 months ago
- ☆10Mar 9, 2024Updated last year
- SSH Bruteforce Basic Script created with C++ to Linux☆10Jan 28, 2023Updated 3 years ago
- This is a phishing ready platform. Unlike other phishing methods, EvilnoVNC allows you to bypass 2FA using a real browser via noVNC conn…☆10Apr 7, 2023Updated 2 years ago
- MITM to Capture FTP Credentials☆14Apr 27, 2022Updated 3 years ago
- Simple C++ Reverse Shell☆13Nov 22, 2022Updated 3 years ago
- C++ keylogger to save all the keys pressed into a local txt file☆11Apr 6, 2023Updated 2 years ago
- Threat Hijacking Simple Implementation☆18Feb 24, 2025Updated 11 months ago
- AdminX it's a Malware to execute process as some users from a Windows OS☆11May 4, 2023Updated 2 years ago
- Just another repository holding files of Shadow Brokers. Extracted myself.☆51Apr 9, 2017Updated 8 years ago
- all-in-one tool designed for creating, configuring, and deploying custom tokens☆18May 5, 2025Updated 9 months ago
- Post-Exploitation Tool to Steal MySQL Data, and with persistence extract all data from MySQL table every time that Windows are opened wit…☆13Apr 2, 2023Updated 2 years ago
- ☆29Oct 29, 2025Updated 3 months ago
- Very basic Web created with HTML and JavaScript to create Online Payload to do Reverse Shells☆12Oct 12, 2022Updated 3 years ago
- ☆16Jun 21, 2024Updated last year
- ☆18Aug 14, 2023Updated 2 years ago
- Exploit Development CheatSheet.☆18Aug 9, 2021Updated 4 years ago
- Largest Prompts Directory on internet - 10K+ Prompts | Veo3 | Databricks | Cursor | Manus | Same.dev | Lovable | Devin | Replit Agent | …☆115Jun 30, 2025Updated 7 months ago
- Linux Malware creator to attack Windows System via Reverse Shell with FindWindow Process Code Injection☆19Mar 18, 2023Updated 2 years ago
- A python-based vulnerability scanner designed to identify open redirect flaws in website applications.☆18Apr 24, 2025Updated 9 months ago
- Wordlists for content discovery with special words in different languages☆14Jan 17, 2025Updated last year
- Python Scanner and Exploiter of Remote File Inclusion Vulnerabilitie☆13Jan 6, 2022Updated 4 years ago
- Simple Python Modular Script to Broke Web Logins☆15Oct 7, 2022Updated 3 years ago
- A cognitive playbook for experienced smart contract auditors. Structures audit thinking, exploration, validation, and reporting. Not an a…☆34Jan 23, 2026Updated 3 weeks ago
- Coinbase NFT floor price estimate model☆22Mar 1, 2023Updated 2 years ago
- The TradeX bot can accept TradingView webhooks and email alerts to place trades on multiple crypto exchanges.☆18Jan 10, 2026Updated last month
- ☆15Apr 17, 2025Updated 9 months ago
- ☆35Jul 8, 2025Updated 7 months ago
- Easy Port Scanner with Python☆14Dec 3, 2021Updated 4 years ago
- ☆22Nov 11, 2024Updated last year
- Downloads source code from lovable.dev with a single click☆26Dec 17, 2025Updated last month
- Streamlit Data Connector to NewsAPI. Available as a PyPi package.