Stego is an open-source and free steganography tool that lets you hide your secret message in an image or audio file. You will not notice any change in the image or audio file. However, your secret message will be inside the original image or audio file
☆155Sep 11, 2021Updated 4 years ago
Alternatives and similar repositories for StegoCracker
Users that are interested in StegoCracker are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Tool to check if an app is installed on the target device through a link☆131Mar 13, 2020Updated 6 years ago
- Wordlist creator written in C to generate all possibilities of passwords☆93Jun 16, 2018Updated 7 years ago
- Image Steganography using QR-codes written in Python 3.7.☆12Mar 13, 2021Updated 5 years ago
- Script to generate Android App that can hijack autenticated sessions in cookies☆203Dec 21, 2018Updated 7 years ago
- Detect evil urls that uses IDN Homograph Attack.☆208Jan 24, 2018Updated 8 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Unlimited Call - Text Bombing Tool☆14Nov 11, 2021Updated 4 years ago
- WiFi Cracking Tool (Using Evil Twin Attack) With Some Modification. (Only For Legal Purposes)☆283May 13, 2018Updated 7 years ago
- Chrome Keylogger Extension | Post Exploitation Tool☆442Apr 26, 2022Updated 4 years ago
- Inject malicious code into *.debs☆287Apr 26, 2022Updated 4 years ago
- A tool for steganography of png files .☆24Jul 27, 2022Updated 3 years ago
- An image steganography with high embedding capacity based on a genetic algorithm☆11Nov 9, 2019Updated 6 years ago
- Android Keylogger + Reverse Shell☆481Apr 1, 2022Updated 4 years ago
- Will Search Various Platforms to Confirm An Email Exists.☆10May 29, 2020Updated 5 years ago
- privilege escalation by piggy-backing user sudo requests☆12Feb 6, 2023Updated 3 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Post-Exploitation module for Penetration Tester and Hackers.☆28Dec 29, 2021Updated 4 years ago
- Bluetooth Honeypot☆267Apr 2, 2026Updated last month
- Advanced MSF Payload Generator tool for Linux☆105Mar 17, 2025Updated last year
- VOID is for scanning and hacking. There is many popular tools in VOID. You can scan web databases and vulnerabilities. Also you can brute…☆37May 23, 2022Updated 3 years ago
- Web hacking framework with tools, exploits by python☆403Dec 8, 2022Updated 3 years ago
- This tool allows you to perform OSINT and reconnaissance on an organisation or an individual. It allows one to search 1.4 Billion clear t…☆542Dec 13, 2018Updated 7 years ago
- This a Complete tool contained box for Capture The Flag competition. Mostly I have inserted all the necessary tools. Some of the people h…☆11Apr 16, 2022Updated 4 years ago
- Script that generates an Android App to hack SMS through WAN☆409Jan 15, 2025Updated last year
- Ranger Reloaded is a Python script that can be used to scan alive hosts on your network and check for vulnerable open ports.☆30Jan 9, 2023Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Hide text informations using invisible text characters☆12Apr 4, 2022Updated 4 years ago
- The long shadow to emerge as other Git repositories☆18Feb 25, 2026Updated 2 months ago
- Pivot your way deeper into computer networks with SSH compromised machines.☆65Oct 18, 2022Updated 3 years ago
- rang3r | Multi Thread IP + Port Scanner☆131Oct 28, 2023Updated 2 years ago
- Another vulnerability scanner☆18Aug 9, 2025Updated 9 months ago
- Botnet targeting Windows machines 🐍☆48Feb 25, 2026Updated 2 months ago
- Python wordlist generator☆182Apr 26, 2022Updated 4 years ago
- Code for "Deep Residual Networks for Image in speech Steganography"☆16Mar 31, 2020Updated 6 years ago
- Fake-AP to perform Evil Twin Attack☆150Jul 29, 2018Updated 7 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Small python script to look for common vulnerabilities on SMTP server.☆48Dec 17, 2023Updated 2 years ago
- Python Script for Email Bombing which supports Gmail, Yahoo, Hotmail/Outlook☆27Sep 30, 2020Updated 5 years ago
- Google dorking tool☆249Jan 1, 2026Updated 4 months ago
- Steganography applied to conceal small files inside a PNG image.☆18Mar 27, 2018Updated 8 years ago
- Simple Remote Access Trojan Tool☆267Feb 18, 2022Updated 4 years ago
- Linked Pixel Steganography (LPS) technique is a variant of the well-known LSB steganography. It can be applied to any type of images.☆20May 16, 2023Updated 2 years ago
- Image encryption and embedding encrypted text in the image.☆24Dec 15, 2020Updated 5 years ago