StegHigh / steghideLinks
☆651Updated last year
Alternatives and similar repositories for steghide
Users that are interested in steghide are comparing it to the libraries listed below
Sorting:
- Software to identify the different types of hashes used to encrypt data and especially passwords☆610Updated last year
- Steganography brute-force utility to uncover hidden data inside files☆572Updated 4 years ago
- Worlds fastest steghide cracker, chewing through millions of passwords per second☆1,142Updated last year
- Least Significant Bit Steganography for bitmap images (.bmp and .png), WAV sound files, and byte sequences. Simple LSB Steganalysis (LSB …☆625Updated 9 months ago
- Fetch, install and search wordlist archives from websites and torrent peers.☆514Updated last year
- Yet another Stego Tool☆386Updated 2 years ago
- Audio file steganography. Hides files or text inside audio files and retrieve them automatically☆285Updated 2 years ago
- TorGhost is an anonymization script. TorGhost redirects all internet traffic through SOCKS5 tor proxy. DNS requests are also redirected v…☆896Updated 4 years ago
- A framework for layer 2 attacks☆783Updated last year
- An Intelligent wordlist generator based on user profiling, permutations, and statistics. (Named after the same tool in Mr.Robot series S0…☆856Updated 9 months ago
- Mentalist is a graphical tool for custom wordlist generation. It utilizes common human paradigms for constructing passwords and can outpu…☆1,886Updated 2 years ago
- Post-exploitation tool to cover your tracks on a compromised machine (beta)☆401Updated 2 years ago
- pwncat - netcat on steroids with Firewall, IDS/IPS evasion, bind and reverse shell, self-injecting shell and port forwarding magic - and …☆1,873Updated 2 years ago
- GNU MAC Changer☆639Updated 3 years ago
- All releases of the security research group (a.k.a. hackers) The Hacker's Choice☆720Updated 2 years ago
- Password recovery tool for Microsoft Operating Systems. It allows easy recovery of various kind of passwords by sniffing the network, cra…☆546Updated 2 weeks ago
- Image Payload Creating/Injecting tools☆1,242Updated last year
- Hashcat Cheatsheet for OSCP☆618Updated 5 years ago
- Foremost is a console program to recover files based on their headers, footers, and internal data structures. This process is commonly re…☆327Updated 2 years ago
- A braindead program for cracking encrypted ZIP archives. Forked from http://oldhome.schmorp.de/marc/fcrackzip.html☆455Updated 2 years ago
- 🔎Searches Hash APIs to crack your hash quickly🔎 If hash is not found, automatically pipes into HashCat⚡☆1,364Updated 4 months ago
- RockYou2021.txt is a MASSIVE WORDLIST compiled of various other wordlists. RockYou2021.txt DOES NOT CONTAIN USER:PASS logins!☆954Updated last year
- Medusa is a speedy, parallel, and modular, login brute-forcer.☆783Updated 2 months ago
- Transparent proxy through Tor for Kali Linux OS☆1,142Updated last year
- 🔗 Don't know what type of hash it is? Name That Hash will name that hash type! 🤖 Identify MD5, SHA256 and 300+ other hashes ☄ Comes wi…☆1,575Updated 4 months ago
- Repo of all the default wordlists included in Kali. Convienent if you're using something other than Kali.☆228Updated 3 years ago
- Crack hashes in seconds.☆1,826Updated 7 months ago
- parrot anonymous mode☆392Updated last year
- Collection of steganography tools - helps with CTF challenges☆2,538Updated 2 years ago
- detect stegano-hidden data in PNG & BMP☆1,431Updated last year