Steganography brute-force utility to uncover hidden data inside files
☆592Dec 25, 2020Updated 5 years ago
Alternatives and similar repositories for StegCracker
Users that are interested in StegCracker are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Yet another Stego Tool☆402Jul 3, 2023Updated 2 years ago
- Worlds fastest steghide cracker, chewing through millions of passwords per second☆1,252Oct 10, 2023Updated 2 years ago
- Collection of steganography tools - helps with CTF challenges☆2,644Nov 27, 2022Updated 3 years ago
- Execute a brute force attack with Steghide to file with hide information and password established☆122Sep 21, 2020Updated 5 years ago
- detect stegano-hidden data in PNG & BMP☆1,547Jan 28, 2026Updated last month
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Least Significant Bit Steganography for bitmap images (.bmp and .png), WAV sound files, and byte sequences. Simple LSB Steganalysis (LSB …☆647Oct 10, 2025Updated 5 months ago
- Scripted Local Linux Enumeration & Privilege Escalation Checks☆7,877Sep 6, 2023Updated 2 years ago
- A swiss army knife for pentesting networks☆9,108Dec 6, 2023Updated 2 years ago
- RSA attack tool (mainly for ctf) - retrieve private key from weak public key and/or uncipher data☆6,838Mar 2, 2026Updated 3 weeks ago
- JAWS - Just Another Windows (Enum) Script☆1,931Apr 19, 2021Updated 4 years ago
- Fast Steganography bruteforce tool written in Rust useful for CTF's☆246Jun 18, 2025Updated 9 months ago
- PowerShell script to quickly find missing software patches for local privilege escalation vulnerabilities.☆1,995Oct 10, 2018Updated 7 years ago
- A set of security related tools☆686Mar 8, 2021Updated 5 years ago
- Totally Automatic LFI Exploiter (+ Reverse Shell) and Scanner☆1,920Apr 13, 2022Updated 3 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- The ultimate WinRM shell for hacking/pentesting☆5,306Mar 10, 2026Updated 2 weeks ago
- Detect hidden files and text in images☆127May 21, 2023Updated 2 years ago
- Monitor linux processes without root permissions☆5,939Mar 1, 2026Updated 3 weeks ago
- ☆720Feb 20, 2024Updated 2 years ago
- A braindead program for cracking encrypted ZIP archives. Forked from http://oldhome.schmorp.de/marc/fcrackzip.html☆467Mar 23, 2023Updated 3 years ago
- A plugin-based scanner that aids security researchers in identifying issues with several CMSs, mainly Drupal & Silverstripe.☆1,412Jan 19, 2024Updated 2 years ago
- Linux enumeration tool for pentesting and CTFs with verbosity levels☆3,874Dec 25, 2023Updated 2 years ago
- Audio file steganography. Hides files or text inside audio files and retrieve them automatically☆297May 26, 2023Updated 2 years ago
- Impacket is a collection of Python classes for working with network protocols.☆15,576Mar 20, 2026Updated last week
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Nishang - Offensive PowerShell for red team, penetration testing and offensive security.☆9,805Apr 25, 2024Updated last year
- Pop shells like a master.☆1,491Apr 2, 2019Updated 6 years ago
- A Tool for Domain Flyovers☆5,916May 22, 2022Updated 3 years ago
- Enumerate missing KBs and suggest exploits for useful Privilege Escalation vulnerabilities☆1,663Nov 28, 2020Updated 5 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆12,924Aug 17, 2020Updated 5 years ago
- OWASP Joomla Vulnerability Scanner Project https://www.secologist.com/☆1,176Sep 11, 2024Updated last year
- PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)☆19,539Updated this week
- Web application fuzzer☆6,452Jan 21, 2026Updated 2 months ago
- EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.☆5,664Jan 5, 2026Updated 2 months ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Imago is a python tool that extract digital evidences from images.☆267Dec 23, 2021Updated 4 years ago
- Some setup scripts for security research tools.☆9,333Mar 1, 2026Updated 3 weeks ago
- Scripts to make password spraying attacks against Lync/S4B, OWA & O365 a lot quicker, less painful and more efficient☆1,559Oct 17, 2022Updated 3 years ago
- Printer Exploitation Toolkit - The tool that made dumpster diving obsolete.☆4,228Aug 2, 2024Updated last year
- An advanced memory forensics framework☆7,987May 16, 2025Updated 10 months ago
- A repository with 3 tools for pwn'ing websites with .git repositories available☆4,133Jun 14, 2023Updated 2 years ago
- Automated NoSQL database enumeration and web application exploitation tool.☆3,252Feb 20, 2026Updated last month