cle0n / myoolLinks
[Anti-Forensics, Steganography, Data Exfiltration] Encrypt a file and hide it in any PDF.
☆13Updated 8 years ago
Alternatives and similar repositories for myool
Users that are interested in myool are comparing it to the libraries listed below
Sorting:
- Anti-forensic monitor program: watches for signs of tampering and purges keys/shuts everything down.☆30Updated 8 years ago
- Geolocate your files!☆16Updated 3 years ago
- A Camouflage Proxy for the Tor Anonymity System☆82Updated 9 years ago
- This repository contains additional files mentioned in the blog post☆22Updated 6 years ago
- DeCryKe is a technique to transform almost any cryptographic algorithm into deniable-one, it is a decry of Russia's anti-terrorism law (a…☆23Updated 7 years ago
- ☆15Updated 8 years ago
- like hidden-tear with libsodium☆20Updated 9 years ago
- suspect is a simple bash triage tool☆18Updated 6 years ago
- Adversary Lab is a service that analyzes captured network traffic to extract statistical properties. Using this analysis, filtering rules…☆23Updated 7 months ago
- Satellite: Measuring The Internet's Stars☆38Updated 4 years ago
- Documents pertaining to internal policies and guidelines☆12Updated 8 years ago
- Investigation data from two reports around the Blue Coat networking kit.☆17Updated 11 years ago
- quotes i like.☆15Updated 5 years ago
- Wardriving ekoparty☆15Updated 7 years ago
- Truehunter☆31Updated 4 years ago
- tamper resistant audit log☆18Updated 6 years ago
- Various modules to implement the DetecTor design from http://detector.kuix.de☆52Updated 8 years ago
- Results of a recent FOIA for NIST documents related to the design of Dual EC DRBG. Via EFF and Rep. Grayson's office. See README for deta…☆24Updated 10 years ago
- A GUI-based tool to perform security testing against the HDMI CEC (Consumer Electronics Control) and HEC (HDMI Ethernet Channel) protocol…☆30Updated 11 years ago
- Quick proof of concept to detect a Kippo SSH honeypot instance externally☆57Updated 10 years ago
- ☆32Updated 11 years ago
- find and detect Malicious TOR Relays☆14Updated 9 years ago
- Off-chain secure communication protocol with Zero-knowledge proof (Ring Signature) and metadata protection.☆24Updated 9 months ago
- NAT Pinning test suite tool for penetration testers.☆31Updated 11 years ago
- Check All APK's -- scripts for checking your phone for malware☆30Updated 7 years ago
- Security Advisories and Researches☆16Updated 10 years ago
- ☆20Updated 4 years ago
- Network white noise collector☆19Updated 9 years ago
- python based backdoor software☆17Updated 13 years ago
- CDitter - Electromechanical based data exfiltration, through the movement of a CD drive☆12Updated 3 years ago