RickdeJager / stegseekView external linksLinks
Worlds fastest steghide cracker, chewing through millions of passwords per second
☆1,233Oct 10, 2023Updated 2 years ago
Alternatives and similar repositories for stegseek
Users that are interested in stegseek are comparing it to the libraries listed below
Sorting:
- Steganography brute-force utility to uncover hidden data inside files☆588Dec 25, 2020Updated 5 years ago
- Collection of steganography tools - helps with CTF challenges☆2,633Nov 27, 2022Updated 3 years ago
- detect stegano-hidden data in PNG & BMP☆1,537Jan 28, 2026Updated 2 weeks ago
- Yet another Stego Tool☆401Jul 3, 2023Updated 2 years ago
- RSA attack tool (mainly for ctf) - retrieve private key from weak public key and/or uncipher data☆6,759Dec 3, 2025Updated 2 months ago
- PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)☆19,268Feb 4, 2026Updated last week
- ☆701Feb 20, 2024Updated last year
- Steganalysis web platform☆777Feb 2, 2026Updated last week
- Monitor linux processes without root permissions☆5,871Jan 17, 2023Updated 3 years ago
- Linux enumeration tool for pentesting and CTFs with verbosity levels☆3,840Dec 25, 2023Updated 2 years ago
- Fancy reverse and bind shell handler☆2,870Aug 9, 2024Updated last year
- Least Significant Bit Steganography for bitmap images (.bmp and .png), WAV sound files, and byte sequences. Simple LSB Steganalysis (LSB …☆643Oct 10, 2025Updated 4 months ago
- Volatility 3.0 development☆3,889Feb 5, 2026Updated last week
- Impacket is a collection of Python classes for working with network protocols.☆15,433Feb 5, 2026Updated last week
- 🔗 Don't know what type of hash it is? Name That Hash will name that hash type! 🤖 Identify MD5, SHA256 and 300+ other hashes ☄ Comes wi…☆1,631Dec 19, 2025Updated last month
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆75,135Feb 2, 2026Updated last week
- This repository aims to hold suggestions (and hopefully/eventually code) for CTF challenges. The "project" is nicknamed Katana.☆2,884May 6, 2023Updated 2 years ago
- A next generation version of enum4linux (a Windows/Samba enumeration tool) with additional features like JSON/YAML export. Aimed for secu…☆1,527Dec 16, 2025Updated last month
- GTFOBins is a curated list of Unix-like executables that can be used to bypass local security restrictions in misconfigured systems.☆12,615Feb 5, 2026Updated last week
- Scripted Local Linux Enumeration & Privilege Escalation Checks☆7,815Sep 6, 2023Updated 2 years ago
- Some setup scripts for security research tools.☆9,284Updated this week
- A fast, simple, recursive content discovery tool written in Rust.☆7,482Feb 6, 2026Updated last week
- An advanced memory forensics framework☆7,963May 16, 2025Updated 8 months ago
- Exploit Development and Reverse Engineering with GDB & LLDB Made Easy☆9,995Updated this week
- The ultimate WinRM shell for hacking/pentesting☆5,237Jan 9, 2026Updated last month
- ⚡ Automatically decrypt encryptions without knowing the key or cipher, decode encodings, and crack hashes ⚡☆21,015Mar 5, 2025Updated 11 months ago
- A swiss army knife for pentesting networks☆9,050Dec 6, 2023Updated 2 years ago
- A web-based, accessible and open-source port of StegSolve.☆370Jan 20, 2026Updated 3 weeks ago
- Fast web fuzzer written in Go☆15,574Apr 24, 2025Updated 9 months ago
- CTF framework and exploit development library☆13,250Jan 23, 2026Updated 3 weeks ago
- Hash type identifier (CLI & lib)☆941Jan 22, 2026Updated 3 weeks ago
- A toolkit for testing, tweaking and cracking JSON Web Tokens☆6,347May 1, 2025Updated 9 months ago
- AutoRecon is a multi-threaded network reconnaissance tool which performs automated enumeration of services.☆5,888Jan 28, 2026Updated 2 weeks ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆68,783Updated this week
- Trying to tame the three-headed dog.☆4,869Nov 14, 2025Updated 2 months ago
- 🤖 The Modern Port Scanner 🤖☆19,206Updated this week
- pwncat - netcat on steroids with Firewall, IDS/IPS evasion, bind and reverse shell, self-injecting shell and port forwarding magic - and …☆1,927Sep 23, 2022Updated 3 years ago
- A repository with 3 tools for pwn'ing websites with .git repositories available☆4,125Jun 14, 2023Updated 2 years ago
- A collection of software installations scripts for Windows systems that allows you to easily setup and maintain a reverse engineering env…☆8,338Dec 23, 2025Updated last month