Estella / stegleakLinks
Facial Recognition and Steganography
☆10Updated 6 years ago
Alternatives and similar repositories for stegleak
Users that are interested in stegleak are comparing it to the libraries listed below
Sorting:
- The SSH Multiplex Backdoor Tool☆65Updated 6 years ago
- Written by InGuardians' Faith Alderson and Larry Pesce, VaporTrail is a tool for data transmission over FM, using RPITX to transmit from …☆53Updated 8 years ago
- ☆47Updated 6 years ago
- ☆52Updated 3 weeks ago
- ☆30Updated 5 years ago
- Keystroke injection vulnerabilities in wireless presentation clickers☆96Updated 6 years ago
- dawg the hallway monitor - monitor operating system changes and analyze introduced attack surface when installing software☆55Updated 6 years ago
- Code/videos/supporting files for the demos of my Defcon24 talk, "Let's Get Physical: Network Attacks Against Physical Security Systems"☆42Updated 9 years ago
- Toolset to analyze disks encrypted with McAFee FDE technology☆19Updated 4 years ago
- Rogue AP killer☆91Updated 7 years ago
- A USB armory based USB sandbox☆21Updated 8 years ago
- Concierge Toolkit: Physical Access Control Identification and Exploitation☆118Updated 7 years ago
- DFF (Digital Forensics Framework)☆11Updated 5 years ago
- A PoC on passing data through UNIX file privilege bits (RWX Triplets)☆27Updated 8 years ago
- Zone transfers for rwhois☆20Updated 6 years ago
- ☆22Updated 7 years ago
- New and Improved☆17Updated 9 years ago
- Here's a Perl script that can either be used as a protocol fuzzer, or a DoS tool☆24Updated 8 years ago
- Redis Security Map - Anti-hacking for Redis☆31Updated 3 years ago
- Documentation and proofs of concept on the polyglot file PEDICOM (PE executable + DICOM)☆38Updated 6 years ago
- Collection of my slide decks, conference videos and research white papers☆27Updated 3 months ago
- My collection of dockerfiles☆24Updated 9 years ago
- GitPwnd is a network penetration tool that lets you use a git repo for command and control of compromised machines☆145Updated 2 years ago
- Wi-Fi Covert Channel Chat demo application☆72Updated 8 years ago
- Container and files for a beginners workshop on writing Linux x86_64☆25Updated 5 years ago
- ☆15Updated 5 years ago
- Quickly check credentials against multiple websites and identify instances of credential reuse☆105Updated 9 years ago
- Bash script to Check for malicious Cryptomining☆38Updated 7 years ago
- Stealthy data exfiltration via IPv6 covert channel☆103Updated 6 years ago
- Compares the TLS configuration of a web server to the Mozilla TLS Profiles☆26Updated 2 years ago