KuroLabs / stegcloak
Hide secrets with invisible characters in plain text securely using passwords 🧙🏻♂️⭐
☆3,317Updated last month
Related projects ⓘ
Alternatives and complementary repositories for stegcloak
- A temporary SMS utility right from your terminal written in POSIX sh☆1,044Updated last year
- 🔪 Leak git repositories from misconfigured websites☆1,552Updated last year
- Scanning APK file for URIs, endpoints & secrets.☆4,960Updated last month
- Network Analysis Tool☆3,026Updated last year
- 🔎Searches Hash APIs to crack your hash quickly🔎 If hash is not found, automatically pipes into HashCat⚡☆1,282Updated last year
- ⚡ Automatically decrypt encryptions without knowing the key or cipher, decode encodings, and crack hashes ⚡☆18,241Updated 7 months ago
- The all-in-one browser extension for offensive security professionals 🛠☆5,825Updated 3 months ago
- An HTTP toolkit for security research.☆6,134Updated 6 months ago
- Serverless, peer-to-peer, local file sharing through sound☆2,189Updated 3 years ago
- Pack up to 3MB of data into a tweetable PNG polyglot file.☆2,548Updated 3 years ago
- 🔎 Impossibly fast web search, made for static sites.☆2,730Updated last year
- Berty is a secure peer-to-peer messaging app that works with or without internet access, cellular data or trust in the network☆7,633Updated this week
- ⚠️ Browser fingerprinting via favicon!☆4,572Updated last year
- 🗄 Mount your browser tabs as a filesystem.☆3,822Updated last year
- Ah shhgit! Find secrets in your code. Secrets detection for your GitHub, GitLab and Bitbucket repositories.☆3,841Updated last year
- Take browser screenshots in Javascript 📸☆1,965Updated 5 months ago
- 🔗 Don't know what type of hash it is? Name That Hash will name that hash type! 🤖 Identify MD5, SHA256 and 300+ other hashes ☄ Comes wi…☆1,486Updated 10 months ago
- 💾 dn - offline full-text search and archiving for your Chromium-based browser.☆3,785Updated 2 weeks ago
- NAT Slipstreaming allows an attacker to remotely access any TCP/UDP services bound to a victim machine, bypassing the victim’s NAT/firewa…☆1,902Updated last year
- Information gathering framework for phone numbers☆13,178Updated 4 months ago
- A minimalist command line knowledge base manager☆3,170Updated last year
- A collection of all the data i could extract from 1 billion leaked credentials from internet.☆3,059Updated 4 years ago
- CLI and local web plain text note‑taking, bookmarking, and archiving with linking, tagging, filtering, search, Git versioning & syncing, …☆6,704Updated 2 weeks ago
- Collection of malware source code for a variety of platforms in an array of different programming languages.☆15,865Updated last month
- Whoami provides enhanced privacy, anonymity for Debian and Arch based linux distributions☆1,961Updated last month
- Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins, pwnkit, dirty pipe, +w docker.sock☆6,691Updated 8 months ago
- API, CLI, and Web App for analyzing and finding a person's profile in 1000 social media \ websites☆11,737Updated last month
- Cross-platform content sharing in a local network☆645Updated last year
- A terminal-based presentation tool with colors and effects.☆4,336Updated last year
- Easily and securely send things from one computer to another☆28,161Updated last week