KuroLabs / stegcloak
Hide secrets with invisible characters in plain text securely using passwords π§π»ββοΈβ
β3,505Updated 6 months ago
Alternatives and similar repositories for stegcloak:
Users that are interested in stegcloak are comparing it to the libraries listed below
- Berty is a secure peer-to-peer messaging app that works with or without internet access, cellular data or trust in the networkβ7,828Updated this week
- πͺ Leak git repositories from misconfigured websitesβ1,568Updated 2 years ago
- π΅οΈββοΈ Offensive Google framework.β16,401Updated 2 months ago
- πΈ Identify anything. pyWhat easily lets you identify emails, IP addresses, and more. Feed it a .pcap file or some text and it'll tell β¦β6,865Updated last year
- β οΈ Browser fingerprinting via favicon!β4,661Updated last year
- Collection of malware source code for a variety of platforms in an array of different programming languages.β16,699Updated 5 months ago
- CloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based Sβ¦β1,596Updated 4 years ago
- An HTTP toolkit for security research.β6,863Updated 2 months ago
- Infection Monkey - An open-source adversary emulation platformβ6,778Updated last month
- A temporary email right from your terminal written in POSIX shβ3,941Updated 8 months ago
- π A collection of interesting, funny, and depressing search queries to plug into shodan.io π©βπ»β6,297Updated 10 months ago
- SSH tarpit that slowly sends an endless bannerβ7,907Updated 10 months ago
- β‘ Automatically decrypt encryptions without knowing the key or cipher, decode encodings, and crack hashes β‘β18,987Updated last month
- People tracker on the Internet: OSINT analysis and research tool by Jose Pinoβ8,273Updated 10 months ago
- HiddenVM β Use any desktop OS without leaving a trace.β2,429Updated 9 months ago
- API, CLI, and Web App for analyzing and finding a person's profile in 1000 social media \ websitesβ12,336Updated 3 months ago
- π Don't know what type of hash it is? Name That Hash will name that hash type! π€ Identify MD5, SHA256 and 300+ other hashes β Comes wiβ¦β1,544Updated last month
- The all-in-one browser extension for offensive security professionals πβ6,049Updated 3 months ago
- NAT Slipstreaming allows an attacker to remotely access any TCP/UDP services bound to a victim machine, bypassing the victimβs NAT/firewaβ¦β1,921Updated 2 years ago
- Awesome-Cellular-Hackingβ3,174Updated 5 months ago
- An effort to build a single place for all useful android and iOS security related stuff. All references and tools belong to their respectβ¦β3,175Updated last year
- π― T-Pot - The All In One Multi Honeypot Platform πβ7,740Updated 3 weeks ago
- Hacking resources and cheat sheets. References, tools, scripts, tutorials, and other resources that help offensive and defensive securityβ¦β2,057Updated 10 months ago
- Stalk your Friends. Find their Instagram, FB and Twitter Profiles using Image Recognition and Reverse Image Search.β4,777Updated last year
- π Bring your favorite shell wherever you go through the ssh. Xonsh shell, fish, zsh, osquery and so on.β5,592Updated 3 weeks ago
- OpenSnitch is a GNU/Linux interactive application firewall inspired by Little Snitch.β11,509Updated this week
- The Swiss Army knife for 802.11, BLE, HID, CAN-bus, IPv4 and IPv6 networks reconnaissance and MITM attacks.β17,540Updated last week
- β1,265Updated 2 months ago
- Know the dangers of credential reuse attacks.β2,050Updated 6 months ago
- Email OSINT & Password breach hunting tool, locally or using premium services. Supports chasing down related emailβ4,412Updated last year