Stego is an open-source and free steganography tool that lets you hide your secret message in an image or audio file. You will not notice any change in the image or audio file. However, your secret message will be inside the original image or audio file
☆154Sep 11, 2021Updated 4 years ago
Alternatives and similar repositories for StegoCracker
Users that are interested in StegoCracker are comparing it to the libraries listed below
Sorting:
- Tool to check if an app is installed on the target device through a link☆125Mar 13, 2020Updated 5 years ago
- Unlimited Call - Text Bombing Tool☆14Nov 11, 2021Updated 4 years ago
- Wordlist creator written in C to generate all possibilities of passwords☆91Jun 16, 2018Updated 7 years ago
- Windows Reverse TCP Shell for Hacking and Pentesting☆24Aug 13, 2024Updated last year
- WiFi Cracking Tool (Using Evil Twin Attack) With Some Modification. (Only For Legal Purposes)☆279May 13, 2018Updated 7 years ago
- Detect evil urls that uses IDN Homograph Attack.☆207Jan 24, 2018Updated 8 years ago
- Chrome Keylogger Extension | Post Exploitation Tool☆440Apr 26, 2022Updated 3 years ago
- Another vulnerability scanner☆18Aug 9, 2025Updated 7 months ago
- Inject malicious code into *.debs☆284Apr 26, 2022Updated 3 years ago
- Small python script to look for common vulnerabilities on SMTP server.☆48Dec 17, 2023Updated 2 years ago
- Image Steganography using QR-codes written in Python 3.7.☆12Mar 13, 2021Updated 4 years ago
- The long shadow to emerge as other Git repositories☆18Feb 25, 2026Updated last week
- VOID is for scanning and hacking. There is many popular tools in VOID. You can scan web databases and vulnerabilities. Also you can brute…☆38May 23, 2022Updated 3 years ago
- Pivot your way deeper into computer networks with SSH compromised machines.☆65Oct 18, 2022Updated 3 years ago
- Multiplatform payload dropper☆281Aug 17, 2021Updated 4 years ago
- (Outdated) Master-Bomber is python based online tool which can help you to prank your friends. By using this tool you can send huge amoun…☆19Jun 30, 2021Updated 4 years ago
- Extendable Python script handler for automating penetration testing.☆40Mar 3, 2023Updated 3 years ago
- An image steganography with high embedding capacity based on a genetic algorithm☆11Nov 9, 2019Updated 6 years ago
- Post-Exploitation module for Penetration Tester and Hackers.☆27Dec 29, 2021Updated 4 years ago
- This tool allows you to perform OSINT and reconnaissance on an organisation or an individual. It allows one to search 1.4 Billion clear t…☆525Dec 13, 2018Updated 7 years ago
- Web hacking framework with tools, exploits by python☆393Dec 8, 2022Updated 3 years ago
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆10Aug 18, 2022Updated 3 years ago
- TCP Data Transfer Tool By ClumsyLulz☆12Feb 25, 2023Updated 3 years ago
- An exotic service bruteforce tool.☆13Apr 12, 2025Updated 10 months ago
- privilege escalation by piggy-backing user sudo requests☆11Feb 6, 2023Updated 3 years ago
- Will Search Various Platforms to Confirm An Email Exists.☆10May 29, 2020Updated 5 years ago
- rang3r | Multi Thread IP + Port Scanner☆126Oct 28, 2023Updated 2 years ago
- Python Script for Email Bombing which supports Gmail, Yahoo, Hotmail/Outlook☆27Sep 30, 2020Updated 5 years ago
- Advanced MSF Payload Generator tool for Linux☆104Mar 17, 2025Updated 11 months ago
- HacKingPro - Hack Like A Pro !☆151Dec 1, 2025Updated 3 months ago
- Python wordlist generator☆181Apr 26, 2022Updated 3 years ago
- web application pentesting tools for docker☆17Aug 9, 2022Updated 3 years ago
- ☆14Updated this week
- Hide text informations using invisible text characters☆12Apr 4, 2022Updated 3 years ago
- Java Program that takes in standard drivers license info and generates a new identity, much like a fake ID. (Just for fun)☆13Dec 9, 2021Updated 4 years ago
- Silent Screenshot Capture | Post Exploitation Payload | VB.NET☆13May 10, 2020Updated 5 years ago
- 🚀 A curated collection of python pentesting and hacking scripts 👨💻☆10Nov 21, 2022Updated 3 years ago
- Basic steganography using python by injecting extra bytes after image file☆15Dec 16, 2023Updated 2 years ago
- Information Gathering Simplified.☆80Jan 17, 2023Updated 3 years ago