SKocur / Image-CipherLinks
Steganography software for encrypting text into image
☆64Updated 6 months ago
Alternatives and similar repositories for Image-Cipher
Users that are interested in Image-Cipher are comparing it to the libraries listed below
Sorting:
- Java Ransomware☆129Updated 11 months ago
- Code developed to steal certain browser config files (history, preferences, etc)☆63Updated 5 years ago
- GZip HTTP Bombing in Python for everyone☆43Updated 8 years ago
- Script allowing hiding or revealing data in image files.☆26Updated 4 years ago
- pure python remote adb scanner + nmap scan module☆22Updated 7 years ago
- Advanced python HTTP reverse shell made for Hacking Competition purpose. I am not responsible of what you do with this tool.☆24Updated 2 years ago
- CryptoLocker is open source files encrypt-er. Crypto is developed in Visual C++. It has features encrypt all file, lock down the system a…☆142Updated 2 years ago
- python hash cracker☆52Updated last year
- Bramble is a hacking Open source suite.☆84Updated 6 years ago
- Ransomware base in Java for all operating systems☆19Updated 8 years ago
- Crack SSH Password using Dictionary and Brute Force Method☆52Updated 6 years ago
- Caesar Cipher☆35Updated 4 months ago
- make virus without coding☆12Updated 5 years ago
- Eternalblue & DoublePulsar scanner☆26Updated 8 years ago
- Let's brute force this hotel's tv.☆82Updated 6 years ago
- A poc to demonstrate how ransomware can spread to enterprise apps through libraries☆11Updated 7 years ago
- Automated Cyber Offense☆88Updated 6 years ago
- Human Oriented SHell☆27Updated last year
- An Android spyware which interacts with a remote C&C server to exfiltrate phone data☆75Updated 5 years ago
- Crypto Ransomware made with: - Go for encryption and decryption - PHP/MySQL for saving and retrieving keys.☆29Updated 8 years ago
- World's first Bitcoin client ddos software // Experimental program to exhaust inbound TCP connections of a Bitcoin node☆24Updated 6 years ago
- Generate customized and undetectable exploits for Metasploit.☆22Updated 8 years ago
- Simple but sharp ransomware☆35Updated 5 years ago
- Modern Web Firewall: stop account takeovers, weak passwords, cloud IPs, DoS attacks, disposable emails☆121Updated 3 years ago
- A clientless, safe, disposable chat service for safe and anonymous communication.☆32Updated 2 weeks ago
- Ransomeware☆48Updated 8 years ago
- tor_ip_switcher is useful for making any DoS attack look like a DDoS attack. Works with toriptables2.☆230Updated 6 months ago
- PewCrypt Ransomware Source☆59Updated 6 years ago
- pagodo (Passive Google Dork) - Automate Google Hacking Database scraping and searching☆12Updated 3 years ago