StegHigh / steghide
☆593Updated 9 months ago
Related projects ⓘ
Alternatives and complementary repositories for steghide
- Steganography brute-force utility to uncover hidden data inside files☆554Updated 3 years ago
- Software to identify the different types of hashes used to encrypt data and especially passwords☆560Updated 6 months ago
- Worlds fastest steghide cracker, chewing through millions of passwords per second☆1,040Updated last year
- Fetch, install and search wordlist archives from websites and torrent peers.☆495Updated 7 months ago
- Hydra Password Cracking Cheetsheet☆385Updated 4 years ago
- A set of security related tools☆651Updated 3 years ago
- Yet another Stego Tool☆358Updated last year
- parrot anonymous mode☆360Updated 11 months ago
- detect stegano-hidden data in PNG & BMP☆1,327Updated 7 months ago
- pwncat - netcat on steroids with Firewall, IDS/IPS evasion, bind and reverse shell, self-injecting shell and port forwarding magic - and …☆1,795Updated 2 years ago
- Audio file steganography. Hides files or text inside audio files and retrieve them automatically☆268Updated last year
- Gives you one-liners that aids in penetration testing operations, privilege escalation and more☆1,678Updated last month
- Wordlist, rules and masks from Kaonashi project (RootedCON 2019)☆1,010Updated 2 years ago
- enum4Linux is a Linux alternative to enum.exe for enumerating data from Windows and Samba hosts☆1,183Updated last month
- Image Payload Creating/Injecting tools☆1,202Updated 11 months ago
- Least Significant Bit Steganography for bitmap images (.bmp and .png), WAV sound files, and byte sequences. Simple LSB Steganalysis (LSB …☆572Updated last month
- MSFvenom Payload Creator (MSFPC)☆1,227Updated 3 years ago
- CeWL is a Custom Word List Generator☆1,999Updated 3 weeks ago
- A tool for automating cracking methodologies through Hashcat from the TrustedSec team.☆1,666Updated last week
- Mentalist is a graphical tool for custom wordlist generation. It utilizes common human paradigms for constructing passwords and can outpu…☆1,813Updated last year
- TorGhost is an anonymization script. TorGhost redirects all internet traffic through SOCKS5 tor proxy. DNS requests are also redirected v…☆864Updated 3 years ago
- Hashcat Cheatsheet for OSCP☆597Updated 4 years ago
- Transparent proxy through Tor for Kali Linux OS☆1,045Updated 7 months ago
- Software to identify the different types of hashes -☆1,343Updated 2 years ago
- GNU MAC Changer☆596Updated 3 years ago
- Reverse shell generator written in Python 3.☆512Updated 10 months ago
- Metadata harvester☆1,031Updated 8 months ago
- coWPAtty: WPA2-PSK Cracking☆190Updated 5 years ago
- Foremost is a console program to recover files based on their headers, footers, and internal data structures. This process is commonly re…☆317Updated last year