StegHigh / steghide
☆609Updated 11 months ago
Alternatives and similar repositories for steghide:
Users that are interested in steghide are comparing it to the libraries listed below
- Steganography brute-force utility to uncover hidden data inside files☆557Updated 4 years ago
- Worlds fastest steghide cracker, chewing through millions of passwords per second☆1,065Updated last year
- Audio file steganography. Hides files or text inside audio files and retrieve them automatically☆271Updated last year
- Yet another Stego Tool☆364Updated last year
- Software to identify the different types of hashes used to encrypt data and especially passwords☆577Updated 8 months ago
- Least Significant Bit Steganography for bitmap images (.bmp and .png), WAV sound files, and byte sequences. Simple LSB Steganalysis (LSB …☆587Updated 3 months ago
- Fetch, install and search wordlist archives from websites and torrent peers.☆501Updated 9 months ago
- detect stegano-hidden data in PNG & BMP☆1,353Updated 10 months ago
- parrot anonymous mode☆373Updated last year
- MSFvenom Payload Creator (MSFPC)☆1,239Updated 3 years ago
- Mentalist is a graphical tool for custom wordlist generation. It utilizes common human paradigms for constructing passwords and can outpu…☆1,829Updated last year
- Metadata harvester☆1,071Updated 10 months ago
- OpenStego is a steganography application that provides two functionalities: a) Data Hiding: It can hide any data within an image file. b)…☆1,196Updated last year
- Web Fuzzer☆375Updated last year
- Post-exploitation tool to cover your tracks on a compromised machine (beta)☆376Updated last year
- Collection of steganography tools - helps with CTF challenges☆2,444Updated 2 years ago
- A framework for layer 2 attacks☆739Updated last year
- A set of security related tools☆657Updated 3 years ago
- 🔎 Most Advanced Open Source Intelligence (OSINT) Framework for scanning IP Address, Emails, Websites, Organizations.☆2,158Updated last year
- OSINT python webscaping framework☆1,067Updated 2 years ago
- Foremost is a console program to recover files based on their headers, footers, and internal data structures. This process is commonly re…☆322Updated last year
- Bruteforcing from various scanner output - Automatically attempts default creds on found services.☆2,074Updated last week
- Image Payload Creating/Injecting tools☆1,216Updated last year
- CeWL is a Custom Word List Generator☆2,075Updated 3 months ago
- pwncat - netcat on steroids with Firewall, IDS/IPS evasion, bind and reverse shell, self-injecting shell and port forwarding magic - and …☆1,816Updated 2 years ago
- Reconnaissance Swiss Army Knife☆1,846Updated 4 years ago
- Hydra Password Cracking Cheetsheet☆391Updated 4 years ago
- Repo of all the default wordlists included in Kali. Convienent if you're using something other than Kali.☆216Updated 2 years ago
- ☆1,092Updated this week
- rsatool can be used to calculate RSA and RSA-CRT parameters☆1,271Updated 2 weeks ago