StegHigh / steghideLinks
☆698Updated last year
Alternatives and similar repositories for steghide
Users that are interested in steghide are comparing it to the libraries listed below
Sorting:
- Software to identify the different types of hashes used to encrypt data and especially passwords☆630Updated last year
- Steganography brute-force utility to uncover hidden data inside files☆588Updated 5 years ago
- Worlds fastest steghide cracker, chewing through millions of passwords per second☆1,235Updated 2 years ago
- Fetch, install and search wordlist archives from websites and torrent peers.☆532Updated last year
- Audio file steganography. Hides files or text inside audio files and retrieve them automatically☆293Updated 2 years ago
- TorGhost is an anonymization script. TorGhost redirects all internet traffic through SOCKS5 tor proxy. DNS requests are also redirected v…☆910Updated 4 years ago
- Mentalist is a graphical tool for custom wordlist generation. It utilizes common human paradigms for constructing passwords and can outpu…☆1,950Updated 2 months ago
- Least Significant Bit Steganography for bitmap images (.bmp and .png), WAV sound files, and byte sequences. Simple LSB Steganalysis (LSB …☆643Updated 3 months ago
- GNU MAC Changer☆670Updated 4 years ago
- parrot anonymous mode☆419Updated 2 years ago
- An Intelligent wordlist generator based on user profiling, permutations, and statistics. (Named after the same tool in Mr.Robot series S0…☆914Updated last year
- Transparent proxy through Tor for Kali Linux OS☆1,199Updated last year
- Yet another Stego Tool☆401Updated 2 years ago
- ☆432Updated 2 years ago
- Web Fuzzer☆431Updated 2 years ago
- Search for leaked credentials☆1,374Updated 4 years ago
- A braindead program for cracking encrypted ZIP archives. Forked from http://oldhome.schmorp.de/marc/fcrackzip.html☆465Updated 2 years ago
- A framework for layer 2 attacks☆829Updated 2 years ago
- Hydra Password Cracking Cheetsheet☆415Updated 5 years ago
- 🔎Searches Hash APIs to crack your hash quickly🔎 If hash is not found, automatically pipes into HashCat⚡☆1,398Updated 11 months ago
- Metadata harvester☆1,213Updated last year
- Medusa is a speedy, parallel, and modular, login brute-forcer.☆846Updated 8 months ago
- One rule to crack all passwords. or atleast we hope so.☆1,598Updated 4 years ago
- enum4Linux is a Linux alternative to enum.exe for enumerating data from Windows and Samba hosts☆1,370Updated 9 months ago
- All releases of the security research group (a.k.a. hackers) The Hacker's Choice☆749Updated 5 months ago
- 🔗 Don't know what type of hash it is? Name That Hash will name that hash type! 🤖 Identify MD5, SHA256 and 300+ other hashes ☄ Comes wi…☆1,631Updated last month
- Shodan Eye This tool collects all the information about all devices directly connected to the internet using the specified keywords that …☆1,103Updated last week
- Wordlist, rules and masks from Kaonashi project (RootedCON 2019)☆1,080Updated 3 years ago
- Foremost is a console program to recover files based on their headers, footers, and internal data structures. This process is commonly re…☆344Updated 2 years ago
- Crack hashes in seconds.☆1,858Updated last year