LaboratoryB / stegosaurusLinks
A (very basic) steganographic device, for encoding a payload into an image
☆24Updated 10 years ago
Alternatives and similar repositories for stegosaurus
Users that are interested in stegosaurus are comparing it to the libraries listed below
Sorting:
- Get the IP adresses of Bittorrent Peers☆13Updated 9 years ago
- A simple TLS forwarder that lets you intercept traffic and play with them.☆29Updated 6 years ago
- pyCryptoCat - A CryptoCat standalone python client.☆24Updated 12 years ago
- A duckyscript compatible Pi-Zero project, which utilises nmap - in particular the OS Detection features - to trigger OS-specific payloads…☆16Updated 9 years ago
- An experimental implementation of a bot client which interprets commands through Twitter, thus requiring no hosting of servers from the c…☆43Updated 10 years ago
- pyCryptoCat - A CryptoCat standalone python client.☆35Updated 11 years ago
- Wordpress Two-factor Authentication Brute-forcer☆19Updated 6 years ago
- scans network for hosts and open ports☆31Updated 8 years ago
- Canari local transforms pcap file analysis☆31Updated 11 years ago
- A regular expression for most valid domains (including the latest TLDs)☆40Updated 10 years ago
- Chaosmap is an information gathering tool and dns / whois / web server scanner.☆15Updated 14 years ago
- netgrafio - Visualize your network☆327Updated 11 years ago
- an autodialer written in nodejs using the twilio api (not functional)☆11Updated 10 years ago
- Monitor traffic for unencrypted data and display a dashboard.☆15Updated 8 years ago
- Install script for grsecurity for Debian environments☆59Updated 10 years ago
- Thanos is a tool made for scan a range of IP's and get the banners of the running services. The main function is do banner grabber, but y…☆45Updated 9 years ago
- Project has moved:☆44Updated 10 years ago
- ☆12Updated 9 years ago
- PoC for getting remote HTTP Server date using gzip compressed HTTP Response☆56Updated 9 years ago
- PoC exploit code for CVE-2015-5477 BIND9 TKEY remote DoS vulnerability☆14Updated 10 years ago
- SuperMesh brings many Decentralized technologies with ease to your home☆24Updated 7 years ago
- Broadcast Anonymous Routing - A scalable system for efficient anonymous communications☆76Updated 9 years ago
- Extracting server private key using Heartbleed OpenSSL vulnerability.☆394Updated 11 years ago
- A keylogger - with lazy implementation - that sends logs through Gmail's SMTP.☆11Updated 10 years ago
- A partial Onion Proxy implementation that's designed to build single-hop circuits through Tor exit nodes☆146Updated 10 years ago
- (Deprecated PoC) Innovative censorship evading technology based on p2p distributed caching network☆58Updated 9 years ago
- Fast Wi-Fi hijacker in C, based on AirPwn ideas and LORCON☆22Updated 8 years ago
- An example of a reverse RAT (remote administration tool / trojan horse) written in NodeJS. Highly experimental.☆16Updated 10 years ago
- True bittorrent DHT in javascript☆216Updated 12 years ago
- Check for HTTP Security Headers☆14Updated 10 years ago