KuroLabs / stegcloak
Hide secrets with invisible characters in plain text securely using passwords π§π»ββοΈβ
β3,449Updated 4 months ago
Alternatives and similar repositories for stegcloak:
Users that are interested in stegcloak are comparing it to the libraries listed below
- A temporary SMS utility right from your terminal written in POSIX shβ1,043Updated last year
- An HTTP toolkit for security research.β6,197Updated 2 weeks ago
- πͺ Leak git repositories from misconfigured websitesβ1,560Updated 2 years ago
- An open-source post-exploitation framework for students, researchers and developers.β9,079Updated last month
- πSearches Hash APIs to crack your hash quicklyπ If hash is not found, automatically pipes into HashCatβ‘β1,321Updated last year
- πΈ Identify anything. pyWhat easily lets you identify emails, IP addresses, and more. Feed it a .pcap file or some text and it'll tell β¦β6,785Updated last year
- An effort to build a single place for all useful android and iOS security related stuff. All references and tools belong to their respectβ¦β3,125Updated 11 months ago
- Scanning APK file for URIs, endpoints & secrets.β5,125Updated 4 months ago
- Simple, fast web crawler designed for easy, quick discovery of endpoints and assets within a web applicationβ4,602Updated last month
- A collection of all the data i could extract from 1 billion leaked credentials from internet.β3,102Updated 4 years ago
- Modlishka. Reverse Proxy.β4,920Updated 10 months ago
- An open-source digital image forensic toolsetβ2,753Updated 3 months ago
- π Share end-to-end encrypted secrets with others via a one-time URLβ1,785Updated last week
- π Don't know what type of hash it is? Name That Hash will name that hash type! π€ Identify MD5, SHA256 and 300+ other hashes β Comes wiβ¦β1,528Updated last year
- Bit is a modern Git CLIβ6,075Updated last year
- Fawkes, privacy preserving tool against facial recognition systems. More info at https://sandlab.cs.uchicago.edu/fawkesβ5,288Updated last year
- A temporary email right from your terminal written in POSIX shβ3,922Updated 6 months ago
- β οΈ Browser fingerprinting via favicon!β4,615Updated last year
- API, CLI, and Web App for analyzing and finding a person's profile in 1000 social media \ websitesβ12,131Updated last month
- Scheme flooding vulnerability: how it works and why it is a threat to anonymous browsingβ646Updated 3 months ago
- HiddenVM β Use any desktop OS without leaving a trace.β2,405Updated 7 months ago
- Berty is a secure peer-to-peer messaging app that works with or without internet access, cellular data or trust in the networkβ7,748Updated this week
- A collection of custom security tools for quick needs.β3,172Updated last year
- a file-sharing tool that allows you to find the responsible person in case of a leakageβ1,051Updated 3 years ago
- π€ The Modern Port Scanner π€β15,665Updated this week
- Securely and anonymously share files, host websites, and chat with friends using the Tor networkβ6,422Updated this week
- Shorten URLs using invisible spacesβ1,710Updated this week
- πΎ dn - offline full-text search and archiving for your Chromium-based browser.β3,814Updated last week
- Email OSINT & Password breach hunting tool, locally or using premium services. Supports chasing down related emailβ4,320Updated last year
- finds publicly known security vulnerabilities in a website's frontend JavaScript librariesβ1,946Updated 5 months ago