StegHigh / steghide
☆640Updated last year
Alternatives and similar repositories for steghide:
Users that are interested in steghide are comparing it to the libraries listed below
- Worlds fastest steghide cracker, chewing through millions of passwords per second☆1,107Updated last year
- Steganography brute-force utility to uncover hidden data inside files☆565Updated 4 years ago
- Fetch, install and search wordlist archives from websites and torrent peers.☆507Updated 11 months ago
- Software to identify the different types of hashes used to encrypt data and especially passwords☆588Updated 11 months ago
- Yet another Stego Tool☆376Updated last year
- CloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based S…☆1,592Updated 4 years ago
- Audio file steganography. Hides files or text inside audio files and retrieve them automatically☆276Updated last year
- pwncat - netcat on steroids with Firewall, IDS/IPS evasion, bind and reverse shell, self-injecting shell and port forwarding magic - and …☆1,846Updated 2 years ago
- Gives you one-liners that aids in penetration testing operations, privilege escalation and more☆1,703Updated 6 months ago
- Image Payload Creating/Injecting tools☆1,230Updated last year
- Foremost is a console program to recover files based on their headers, footers, and internal data structures. This process is commonly re…☆325Updated last year
- enum4Linux is a Linux alternative to enum.exe for enumerating data from Windows and Samba hosts☆1,251Updated 6 months ago
- Least Significant Bit Steganography for bitmap images (.bmp and .png), WAV sound files, and byte sequences. Simple LSB Steganalysis (LSB …☆610Updated 6 months ago
- Mentalist is a graphical tool for custom wordlist generation. It utilizes common human paradigms for constructing passwords and can outpu…☆1,855Updated last year
- A tool for automating cracking methodologies through Hashcat from the TrustedSec team.☆1,724Updated 2 months ago
- ☆428Updated last year
- Shodan Eye This tool collects all the information about all devices directly connected to the internet using the specified keywords that …☆898Updated last year
- Repo of all the default wordlists included in Kali. Convienent if you're using something other than Kali.☆224Updated 3 years ago
- HomePwn - Swiss Army Knife for Pentesting of IoT Devices☆900Updated 2 years ago
- CrackStation.net's Lookup Table Implementation.☆372Updated 6 years ago
- Passphrase wordlist and hashcat rules for offline cracking of long, complex passwords☆1,281Updated last year
- One rule to crack all passwords. or atleast we hope so.☆1,531Updated 3 years ago
- Hydra Password Cracking Cheetsheet☆397Updated 4 years ago
- A Python based web application scanner to gather OSINT and fuzz for OWASP vulnerabilities on a target website.☆1,607Updated 4 months ago
- A next generation version of enum4linux (a Windows/Samba enumeration tool) with additional features like JSON/YAML export. Aimed for secu…☆1,293Updated last week
- MSFvenom Payload Creator (MSFPC)☆1,256Updated 3 years ago
- 🔗 Don't know what type of hash it is? Name That Hash will name that hash type! 🤖 Identify MD5, SHA256 and 300+ other hashes ☄ Comes wi…☆1,544Updated last month
- Post-exploitation tool to cover your tracks on a compromised machine (beta)☆389Updated 2 years ago
- CeWL is a Custom Word List Generator☆2,176Updated 5 months ago
- OnionSearch is a script that scrapes urls on different .onion search engines.☆1,375Updated 8 months ago