KuroLabs / stegcloak
Hide secrets with invisible characters in plain text securely using passwords π§π»ββοΈβ
β3,310Updated last month
Related projects β
Alternatives and complementary repositories for stegcloak
- API, CLI, and Web App for analyzing and finding a person's profile in 1000 social media \ websitesβ11,623Updated 3 weeks ago
- A temporary email right from your terminal written in POSIX shβ3,897Updated 2 months ago
- β‘ Automatically decrypt encryptions without knowing the key or cipher, decode encodings, and crack hashes β‘β18,176Updated 7 months ago
- A temporary SMS utility right from your terminal written in POSIX shβ1,044Updated 11 months ago
- β οΈ Browser fingerprinting via favicon!β4,568Updated last year
- A collection of all the data i could extract from 1 billion leaked credentials from internet.β3,057Updated 4 years ago
- πͺ Leak git repositories from misconfigured websitesβ1,548Updated last year
- An HTTP toolkit for security research.β6,126Updated 6 months ago
- π€β¨οΈ Acoustic keyboard eavesdroppingβ8,532Updated last year
- πΈ Identify anything. pyWhat easily lets you identify emails, IP addresses, and more. Feed it a .pcap file or some text and it'll tell β¦β6,582Updated last year
- Homemade Pwnbox / Rogue AP based on Raspberry Pi β WiFi Hacking Cheatsheets + MindMapβ1,693Updated 7 months ago
- People tracker on the Internet: OSINT analysis and research tool by Jose Pinoβ8,110Updated 4 months ago
- Ah shhgit! Find secrets in your code. Secrets detection for your GitHub, GitLab and Bitbucket repositories.β3,835Updated last year
- π Mount your browser tabs as a filesystem.β3,821Updated last year
- π Most Advanced Open Source Intelligence (OSINT) Framework for scanning IP Address, Emails, Websites, Organizations.β2,069Updated last year
- Berty is a secure peer-to-peer messaging app that works with or without internet access, cellular data or trust in the networkβ7,618Updated this week
- Whoami provides enhanced privacy, anonymity for Debian and Arch based linux distributionsβ1,956Updated 3 weeks ago
- Β« usbkill Β» is an anti-forensic kill-switch that waits for a change on your USB ports and then immediately shuts down your computer.β4,436Updated 8 months ago
- HiddenVM β Use any desktop OS without leaving a trace.β2,352Updated 3 months ago
- NAT Slipstreaming allows an attacker to remotely access any TCP/UDP services bound to a victim machine, bypassing the victimβs NAT/firewaβ¦β1,901Updated last year
- `ls` alternative with useful info and a splash of color π¨β1,273Updated 3 years ago
- πSearches Hash APIs to crack your hash quicklyπ If hash is not found, automatically pipes into HashCatβ‘β1,276Updated last year
- The Swiss Army knife for 802.11, BLE, HID, CAN-bus, IPv4 and IPv6 networks reconnaissance and MITM attacks.β16,727Updated 2 weeks ago
- An open-source digital image forensic toolsetβ2,654Updated 2 weeks ago
- MVT (Mobile Verification Toolkit) helps with conducting forensics of mobile devices in order to find signs of a potential compromise.β10,389Updated last week
- π΅οΈββοΈ Collect a dossier on a person by username from thousands of sitesβ10,241Updated 2 weeks ago
- π΅οΈββοΈ Offensive Google framework.β15,747Updated 2 weeks ago