computationalcore / cryptosteganographyLinks
A python steganography module to store messages or files protected with AES-256 encryption inside an image.
☆126Updated 8 months ago
Alternatives and similar repositories for cryptosteganography
Users that are interested in cryptosteganography are comparing it to the libraries listed below
Sorting:
- python hash cracker☆52Updated last year
- a cli google client that bypasses captcha and rate limiting by using the google alerts "preview" feature☆48Updated 2 years ago
- Break rotational letter substitution (ROT) encoded text, right from your terminal.☆15Updated 2 years ago
- recover Firefox and more browsers logins☆48Updated 4 years ago
- Simple mods to wpa_supplicant to allow more efficient online bruting☆19Updated 6 years ago
- A fork of TorGhost, a little utilitly used to route all traffic through TOR.☆52Updated 5 years ago
- A netcat alternative with remote code execution.☆38Updated 5 years ago
- edge --> powerpoint --> remote-file --> shell☆12Updated 6 years ago
- Simple CLI script to check if you have a password that has been compromised in a data breach.☆54Updated 2 weeks ago
- ☆23Updated 6 years ago
- A web application which detects fake news using machine learning and natural language processing techniques.☆30Updated 4 years ago
- All-in-One Ransomware Decryption Tools (Unofficial Mirror)☆53Updated 4 years ago
- A simple very little blockchain, just for learning.☆26Updated 5 years ago
- A generator for malicious DLL files for DLL Hijacking attacks☆32Updated 5 years ago
- Generate CIA/NSA style project codenames☆22Updated 8 years ago
- Simple script that checks to see if there are any hidden/encoded strings in a file, useful for Steganography challenges.☆13Updated 4 years ago
- Standardizing Security Titles☆13Updated 2 years ago
- Create Tor hidden services in Python.☆52Updated 2 years ago
- Use Invoke-PSImage to deliver a payload in an Image☆53Updated 7 years ago
- The Python Password-Protected Obfuscator☆33Updated 6 years ago
- DrMITM is a program designed to globally log all traffic of a website.☆29Updated 6 years ago
- A cross-platform stager for SILENTTRINITY (https://github.com/byt3bl33d3r/SILENTTRINITY)☆26Updated 6 years ago
- tunnel port to port traffic over an obfuscated channel with AES-GCM encryption.☆68Updated 6 years ago
- The WASM Based Security Toolkit for the Web First Paradigm☆37Updated 2 years ago
- An End to End Encrypted SMS and SMS Tunneling app☆40Updated 2 years ago
- Public exploits☆15Updated 7 years ago
- Web Browser Hooking Framework. Manage, execute and assess web browser vulnerabilities☆40Updated 7 years ago
- PoC to bypass mCaptcha and its rate limiting capabilities from a fully automated bot.☆48Updated 3 years ago
- An Intrusion Detection System written in Python☆27Updated 2 years ago
- A POC C2 server and agent to explore just if/how the Ethereum blockchain can be used for C2☆75Updated 6 years ago