SKocur / Image-Cipher
Steganography software for encrypting text into image that uses modified version of LSB (Least Significant Bit) algorithm.
☆58Updated 4 years ago
Alternatives and similar repositories for Image-Cipher:
Users that are interested in Image-Cipher are comparing it to the libraries listed below
- Caesar Cipher☆33Updated 7 months ago
- A fully undetected, hidden, persistent, reverse netcat shell backdoor for Windows.☆20Updated 4 years ago
- Custom pentesting tools☆13Updated 5 years ago
- Use Invoke-PSImage to deliver a payload in an Image☆52Updated 7 years ago
- Real time voice communication app with custom dialing protocol.☆24Updated 6 years ago
- A pure Python script to easily get a reverse shell☆51Updated 2 years ago
- An evil RAT (Remote Administration Tool) for macOS / OS X.☆18Updated 6 years ago
- pwnKit: Privilege Escalation USB-Rubber-Ducky payload, which exploits CVE-2021-4034 in less than 10sec's and spawns root shell for you.☆10Updated 3 years ago
- 👨🏻💻 A great tool for Ethical Hackers, a malware programmed with Backdoor and Keylogger.☆39Updated 4 years ago
- bettercap official documentation and website contents☆36Updated 5 months ago
- Virtual machines and scripts to attack WPA2-Enterprise networks through Rogue Access Points downgrading the authentication method to GTC☆55Updated last year
- Command line Remote Access tool (RAT) targeting Windows Systems.☆14Updated 5 years ago
- Cryptowall Ransomware from Mr Robot serie S2E1 and S2E2☆26Updated 10 months ago
- ⛔ 🛡️WeDefend- Monitor and Protect Android from Remote Access Trojan☆25Updated 5 years ago
- Feature-rich Post Exploitation Framework with Network Pivoting capabilities.☆96Updated 3 years ago
- CryptoLocker is open source files encrypt-er. Crypto is developed in Visual C++. It has features encrypt all file, lock down the system a…☆139Updated last year
- Elliot Password's Cracker☆47Updated 8 years ago
- Codes for malware, viruses and key-logger and other tools☆30Updated 3 years ago
- Code developed to steal certain browser config files (history, preferences, etc)☆63Updated 4 years ago
- Double pulsar tool of NSA leaked by SHADOW BROKERS☆12Updated 7 years ago
- A Repositories of malicious code (ONLY FOR EDUCATIONAL PURPOSE)☆21Updated 3 years ago
- Bad bad bad bad bad stuff☆11Updated 5 years ago
- An advanced keylogger with a GUI redirects traffic via TOR, designed to be executed on unix operating systems☆13Updated 4 years ago
- A CRYPTOJACKING PROGRAM (MALWARE) >:)☆27Updated 3 years ago
- Live Hidden Camera is a library which record live video and audio from Android device without displaying a preview.☆77Updated 5 years ago
- Simple program to steal private files from removable storages☆89Updated 2 years ago
- C Projects☆11Updated 4 years ago
- An android app to hide files within other files☆14Updated 8 years ago
- ☆23Updated last year
- Remote access trojan created using WinRar with firefox installer and python Reverse Shell embedded.☆27Updated 5 years ago