cle0n / myool
[Anti-Forensics, Steganography, Data Exfiltration] Encrypt a file and hide it in any PDF.
☆13Updated 7 years ago
Alternatives and similar repositories for myool:
Users that are interested in myool are comparing it to the libraries listed below
- Anti-forensic monitor program: watches for signs of tampering and purges keys/shuts everything down.☆29Updated 8 years ago
- Geolocate your files!☆16Updated 3 years ago
- Tools and packages that are used for countering forensic activities, including encryption, steganography, and anything that modify attrib…☆21Updated 5 years ago
- like hidden-tear with libsodium☆20Updated 9 years ago
- A Camouflage Proxy for the Tor Anonymity System☆79Updated 9 years ago
- End-to-End encrypted Tor2Web gateway☆38Updated 4 years ago
- quotes i like.☆14Updated 5 years ago
- OnionSprout is a tool to run publicaly-accessible web services, for example from Raspberry Pi in your home, without a public IP.☆11Updated 4 years ago
- ☆11Updated 8 years ago
- Investigation data from two reports around the Blue Coat networking kit.☆17Updated 10 years ago
- Tor relay nearest neighbour ranking☆10Updated 3 years ago
- ☆20Updated 4 years ago
- Repository for Tor's DNS-related issues.☆17Updated 8 years ago
- A library for peer discovery inside the Tor network☆27Updated 11 months ago
- Honeypot for router backdoor (TCP 32764)☆18Updated 11 years ago
- An IP-Transparent Tor Hidden Service and I2P Connector☆16Updated 11 years ago
- Access .onion sites without Tor Browser☆31Updated 7 years ago
- Modified version of Tor and associated tools for investigating the Hidden Service DHT. This research is old. Lots of work is being done t…☆11Updated 9 years ago
- tamper resistant audit log☆18Updated 6 years ago
- ☆17Updated 7 years ago
- ☆8Updated 4 years ago
- ipv6 to onion service virtual public network adapter☆11Updated 9 years ago
- Mirror of freehaven's anonymous research bibliography☆14Updated 10 years ago
- Minimalistic DNS logging tool☆43Updated 3 years ago
- Check All APK's -- scripts for checking your phone for malware☆30Updated 7 years ago
- Regular expression for matching .onion Tor links (v2 & v3).☆18Updated 2 years ago
- This is the ToRat server, a part of the ToRat Project.☆23Updated 5 years ago
- Abusing Cloudflare Workers to establish persistence and exfiltrate sensitive data at the edge.☆16Updated 2 years ago
- PentestBox Tools Website☆28Updated 8 years ago
- DeCryKe is a technique to transform almost any cryptographic algorithm into deniable-one, it is a decry of Russia's anti-terrorism law (a…☆23Updated 7 years ago