[Anti-Forensics, Steganography, Data Exfiltration] Encrypt a file and hide it in any PDF.
☆12Jun 8, 2017Updated 8 years ago
Alternatives and similar repositories for myool
Users that are interested in myool are comparing it to the libraries listed below
Sorting:
- Tools and packages that are used for countering forensic activities, including encryption, steganography, and anything that modify attrib…☆22Oct 5, 2019Updated 6 years ago
- Anti-forensic monitor program: watches for signs of tampering and purges keys/shuts everything down.☆29Jul 17, 2016Updated 9 years ago
- ☆16May 4, 2017Updated 8 years ago
- Awesome Forensics Resources. Almost 300 open source forensics tools, and 600 blog posts about forensics.☆16Dec 31, 2019Updated 6 years ago
- ☆18Nov 9, 2018Updated 7 years ago
- 🔫 lkm module for emergency binary/script execution☆12Dec 22, 2017Updated 8 years ago
- Toolkit for Filesystem based Data Hiding Techniques.☆39Sep 13, 2019Updated 6 years ago
- Qiwi у тебя в терминале! (Бета версия)☆11May 5, 2021Updated 4 years ago
- A simple Metadata Removal Tool for images and videos using exiftool and ffmpeg in C and Python3.☆116Nov 23, 2025Updated 3 months ago
- SQISign: Short Quaternion and Isogeny Signature – C implementation based on PARI/GP (obsolete implementation)☆27Feb 23, 2023Updated 3 years ago
- Capturing audio (.wav) from target using a link☆12Feb 21, 2020Updated 6 years ago
- GPS Tracker ,基于GPS、北斗的定位器,用于车辆、宠物、老人等需要定位追踪的场景☆24May 23, 2025Updated 9 months ago
- A collection of anti-forensics scripts☆29Oct 19, 2025Updated 4 months ago
- AppCoins is a blockchain-based protocol for the App Economy supported by the Aptoide App Store, and the first ICO serving 200 million us…☆12May 22, 2018Updated 7 years ago
- ☆10Sep 24, 2021Updated 4 years ago
- VK bot для сноса бесед☆11Feb 7, 2021Updated 5 years ago
- Simple and secure secret sharing in the browser☆50Mar 30, 2025Updated 11 months ago
- Stega Shade CLI is a user-friendly command-line interface tool designed for image-based steganography. With a focus on simplicity and sec…☆42Jul 19, 2025Updated 7 months ago
- Fileless persistence, attacks and anti-forensic capabilties.☆92Dec 6, 2018Updated 7 years ago
- A privacy-preserving digital version of punch cards used in store loyalty programs☆11Apr 19, 2021Updated 4 years ago
- An SSH honeypot written entirely in Go.☆12Dec 4, 2025Updated 2 months ago
- Isometric Love design tool☆18Jan 23, 2019Updated 7 years ago
- GooSig: short signatures from RSA that hide the signer's RSA public key☆12Jan 8, 2020Updated 6 years ago
- The Bitmark Device☆10Oct 13, 2015Updated 10 years ago
- Yandex browser password recovery☆11Apr 9, 2025Updated 10 months ago
- ☆12Oct 15, 2016Updated 9 years ago
- Knowledge space for some computerforensic stuff☆14Aug 15, 2014Updated 11 years ago
- Pulsar-plot of Strava runs in Swift 3☆12Apr 2, 2018Updated 7 years ago
- Erlang/OTP MTA (Mail Transfer Agent)☆28Jul 8, 2014Updated 11 years ago
- Multiauth identity server using Node.js and MongoDB.☆16Oct 30, 2018Updated 7 years ago
- Make level up and forgot about termux☆12Jan 29, 2021Updated 5 years ago
- message signing and verifying for Lightning Network☆11Jan 6, 2023Updated 3 years ago
- Misuse cases of Cryptography in real world software products☆12Nov 4, 2018Updated 7 years ago
- correlate an SPI capture of an AMD boot procedure to the PSP firmware components☆15Jan 13, 2026Updated last month
- Checkpointing PoW blockchains with HotStuff BFT☆10Jan 5, 2022Updated 4 years ago
- Computer Security Class - Department of Informatics and Telecommunications, University of Athens☆12Feb 22, 2017Updated 9 years ago
- Encrypted DNS profiles for macOS and iOS☆10Jul 26, 2021Updated 4 years ago
- fscan结果优化,更新DC域筛选☆10Nov 21, 2023Updated 2 years ago
- Une classe de facture en LaTeX☆16Jun 23, 2023Updated 2 years ago