cle0n / myool
[Anti-Forensics, Steganography, Data Exfiltration] Encrypt a file and hide it in any PDF.
☆13Updated 7 years ago
Alternatives and similar repositories for myool:
Users that are interested in myool are comparing it to the libraries listed below
- Anti-forensic monitor program: watches for signs of tampering and purges keys/shuts everything down.☆29Updated 8 years ago
- Bruteforce commandline buffer overflows and automated exploit generation, linux, aggressive arguments☆34Updated 2 years ago
- like hidden-tear with libsodium☆20Updated 9 years ago
- Tools and packages that are used for countering forensic activities, including encryption, steganography, and anything that modify attrib…☆21Updated 5 years ago
- Man-in-the-middle against Tor bridges☆26Updated 5 years ago
- Repository for Tor's DNS-related issues.☆17Updated 8 years ago
- Modified version of Tor and associated tools for investigating the Hidden Service DHT. This research is old. Lots of work is being done t…☆11Updated 9 years ago
- ☆17Updated 7 years ago
- tamper resistant audit log☆18Updated 6 years ago
- A Camouflage Proxy for the Tor Anonymity System☆79Updated 9 years ago
- Geolocate your files!☆16Updated 3 years ago
- Investigation data from two reports around the Blue Coat networking kit.☆17Updated 10 years ago
- Truehunter☆31Updated 3 years ago
- Under Your Radar (UYR): Exfiltration using Steganography☆18Updated 9 years ago
- Mirror of freehaven's anonymous research bibliography☆14Updated 10 years ago
- https://git.torproject.org/pluggable-transports/meek.git☆110Updated 9 years ago
- Honeypot for router backdoor (TCP 32764)☆18Updated 11 years ago
- Tor relay nearest neighbour ranking☆10Updated 3 years ago
- Android application which allows sending SMS, with a specific SMSC without changing system defaults.☆13Updated 10 years ago
- ☆20Updated 4 years ago
- ☆8Updated 4 years ago
- A web app scanner☆26Updated 11 years ago
- A library for peer discovery inside the Tor network☆28Updated 10 months ago
- ☆17Updated 10 years ago
- :e-mail: A simple Cypherpunk message preprocessor that makes it easy to chain Type I anonymous remailers together.☆35Updated 9 years ago
- Security Advisories and Researches☆16Updated 10 years ago
- End-to-End encrypted Tor2Web gateway☆38Updated 4 years ago
- 1st phase of mifare classic nested auth key recovery☆23Updated 7 years ago
- mOrc is a post-exploitation framework for macOS written in Bash☆20Updated last year
- Satellite: Measuring The Internet's Stars☆37Updated 4 years ago