SKocur / Image-CipherLinks
Steganography software for encrypting text into image
☆62Updated 3 months ago
Alternatives and similar repositories for Image-Cipher
Users that are interested in Image-Cipher are comparing it to the libraries listed below
Sorting:
- GZip HTTP Bombing in Python for everyone☆43Updated 8 years ago
 - Script allowing hiding or revealing data in image files.☆26Updated 4 years ago
 - Caesar Cipher☆35Updated 3 weeks ago
 - Java Ransomware☆130Updated 8 months ago
 - Search without being tracked-(Your Own Private Search Engine )☆18Updated 4 years ago
 - A poc to demonstrate how ransomware can spread to enterprise apps through libraries☆11Updated 7 years ago
 - An open-source antivirus for windows☆47Updated 5 years ago
 - Sample Android application that serves as a monitoring service by leveraging on device's accelerometer, camera and microphone. The app us…☆85Updated 10 years ago
 - Bramble is a hacking Open source suite.☆85Updated 5 years ago
 - Code developed to steal certain browser config files (history, preferences, etc)☆63Updated 5 years ago
 - Android Remote Access Trojan Binder☆15Updated 4 months ago
 - Eternalblue & DoublePulsar scanner☆23Updated 8 years ago
 - Encrypted Memory Classloader loader + Builder☆46Updated 2 years ago
 - Samsung ContainerAgent Vulnerability - Local DoS for Samsung smartphone☆70Updated 6 years ago
 - HashExpoit is Great Tool For Cracking Hash☆28Updated 5 years ago
 - python hash cracker☆52Updated 11 months ago
 - A pure Python script to easily get a reverse shell☆51Updated 2 years ago
 - Simple script for the WHID injector - a rubberducky wifi☆115Updated last year
 - Full malware Kit☆57Updated 4 years ago
 - Let's brute force this hotel's tv.☆82Updated 5 years ago
 - Windows Hacking FrameWork using Reverse Shell☆106Updated 7 months ago
 - It's a tool which generate a dictionary from a csv containing personals informations. Generate all common passwords based on perso info.…☆57Updated 5 years ago
 - A Torrent Magnet Link Scrapper☆14Updated 5 years ago
 - Double pulsar tool of NSA leaked by SHADOW BROKERS☆14Updated 8 years ago
 - A collection of tools created for computer security research purposes.☆131Updated 5 years ago
 - Tool to break classical ciphers like Caesar, Vigenere or Substitution ciphers☆28Updated 8 years ago
 - Automated Cyber Offense☆91Updated 6 years ago
 - Elliot Password's Cracker☆49Updated 9 years ago
 - A small TOR Onion Address harvester for checking if the address is available or not.☆77Updated 7 years ago
 - Exploiting Android Devices Running Insecure Remote ADB Service☆20Updated 7 years ago