cle0n / myool
[Anti-Forensics, Steganography, Data Exfiltration] Encrypt a file and hide it in any PDF.
☆13Updated 7 years ago
Alternatives and similar repositories for myool:
Users that are interested in myool are comparing it to the libraries listed below
- Anti-forensic monitor program: watches for signs of tampering and purges keys/shuts everything down.☆29Updated 8 years ago
- Tools and packages that are used for countering forensic activities, including encryption, steganography, and anything that modify attrib…☆21Updated 5 years ago
- like hidden-tear with libsodium☆20Updated 9 years ago
- ☆17Updated 7 years ago
- Truehunter☆31Updated 3 years ago
- ☆20Updated 4 years ago
- Investigation data from two reports around the Blue Coat networking kit.☆18Updated 10 years ago
- Tor relay nearest neighbour ranking☆10Updated 3 years ago
- DeCryKe is a technique to transform almost any cryptographic algorithm into deniable-one, it is a decry of Russia's anti-terrorism law (a…☆23Updated 7 years ago
- python-deepviz is a python wrapper for deepviz.com REST APIs☆11Updated 7 years ago
- Geolocate your files!☆16Updated 3 years ago
- OnionSprout is a tool to run publicaly-accessible web services, for example from Raspberry Pi in your home, without a public IP.☆11Updated 4 years ago
- Bruteforce commandline buffer overflows and automated exploit generation, linux, aggressive arguments☆34Updated 2 years ago
- Off-chain secure communication protocol with Zero-knowledge proof (Ring Signature) and metadata protection.☆23Updated 4 months ago
- tamper resistant audit log☆18Updated 6 years ago
- ☆11Updated 9 years ago
- Minimalistic DNS logging tool☆43Updated 3 years ago
- Prangster tool from the Black Hat USA 2013 presentation "Black-Box Assessment of Pseudorandom Algorithms" by Derek Soeder, Christopher Ab…☆11Updated 10 years ago
- Phishing e-mail repository☆37Updated 4 years ago
- Satellite: Measuring The Internet's Stars☆37Updated 4 years ago
- ☆24Updated last year
- Frontend for MalShare.com☆15Updated 7 months ago
- find and detect Malicious TOR Relays☆14Updated 9 years ago
- ANWI - All New Wireless IDS☆27Updated 5 years ago
- A curated list of awesome malware analysis tools and resources☆15Updated 6 years ago
- mOrc is a post-exploitation framework for macOS written in Bash☆20Updated last year
- ☆8Updated 4 years ago
- ☆12Updated 8 years ago
- dns logger for passive dns collection☆42Updated 12 years ago
- ☆11Updated 8 years ago