cle0n / myoolLinks
[Anti-Forensics, Steganography, Data Exfiltration] Encrypt a file and hide it in any PDF.
☆14Updated 8 years ago
Alternatives and similar repositories for myool
Users that are interested in myool are comparing it to the libraries listed below
Sorting:
- Anti-forensic monitor program: watches for signs of tampering and purges keys/shuts everything down.☆30Updated 9 years ago
- A Camouflage Proxy for the Tor Anonymity System☆82Updated 10 years ago
- Investigation data from two reports around the Blue Coat networking kit.☆17Updated 11 years ago
- Geolocate your files!☆16Updated 3 years ago
- A simple cryptosystem that provides provable plausibly deniable encryption.☆89Updated 6 years ago
- quotes i like.☆15Updated 6 years ago
- Repository for Tor's DNS-related issues.☆17Updated 8 years ago
- End-to-End encrypted Tor2Web gateway☆38Updated 4 years ago
- tamper resistant audit log☆18Updated 7 years ago
- Tools and packages that are used for countering forensic activities, including encryption, steganography, and anything that modify attrib…☆21Updated 5 years ago
- Frontend for MalShare.com☆17Updated last month
- PANORAMIX repo☆20Updated 2 years ago
- Leave no chance to Surveillance Capitalism and let this extension make decisions for you☆29Updated 6 years ago
- Adversary Lab is a service that analyzes captured network traffic to extract statistical properties. Using this analysis, filtering rules…☆22Updated 10 months ago
- https://git.torproject.org/pluggable-transports/meek.git☆115Updated 10 years ago
- NXP Security Controller (SCCv2) - Linux driver☆19Updated 7 months ago
- A curated list of awesome malware analysis tools and resources☆15Updated 7 years ago
- Tor traffic whitelisting gateway☆73Updated 4 months ago
- Satellite: Measuring The Internet's Stars☆39Updated 5 years ago
- Man-in-the-middle against Tor bridges☆27Updated 5 years ago
- A DFIR tool to extract cryptocoin addresses and other indicators of compromise from binaries.☆56Updated last year
- SSH Man In The Middle proxy with credentials interception, asciinema session replay, ...☆23Updated 8 years ago
- A partial Onion Proxy implementation that's designed to build single-hop circuits through Tor exit nodes☆145Updated 10 years ago
- Off-chain secure communication protocol with Zero-knowledge proof (Ring Signature) and metadata protection.☆24Updated last year
- Every document published from the Snowden archive☆70Updated 10 years ago
- The VPN Rotator is a Bash/Debian framework for security researchers eager to protect their residential IP and wanting to replay malware t…☆65Updated 4 months ago
- Mirror of freehaven's anonymous research bibliography☆14Updated 10 years ago
- Resolver implementation☆26Updated 5 years ago
- CVE-2017-5689 Proof-of-Concept exploit☆57Updated 8 years ago
- Test Suite for John the Ripper☆25Updated 3 years ago