computationalcore / cryptosteganographyLinks
A python steganography module to store messages or files protected with AES-256 encryption inside an image.
☆126Updated 9 months ago
Alternatives and similar repositories for cryptosteganography
Users that are interested in cryptosteganography are comparing it to the libraries listed below
Sorting:
- A web application which detects fake news using machine learning and natural language processing techniques.☆30Updated 4 years ago
- python hash cracker☆52Updated last year
- recover Firefox and more browsers logins☆48Updated 4 years ago
- Reverse Shell with Python 3☆26Updated 4 years ago
- Create Tor hidden services in Python.☆52Updated 2 years ago
- SteCoSteg is OutGuess successor and Vernam cipher analog in steganography.☆56Updated 6 years ago
- All-in-One Ransomware Decryption Tools (Unofficial Mirror)☆53Updated 4 years ago
- a cli google client that bypasses captcha and rate limiting by using the google alerts "preview" feature☆48Updated 2 years ago
- Python implementation of the SlowLoris DoS attack.☆24Updated 8 years ago
- Command line interface to interact with hashes.com escrow service.☆41Updated 5 months ago
- Simple script to convert and obscure any IP address of any host.☆23Updated 8 years ago
- MSFVenom Powershell Stager Encoder & Generator☆16Updated 4 years ago
- Simple CLI script to check if you have a password that has been compromised in a data breach.☆54Updated last week
- Advanced python HTTP reverse shell made for Hacking Competition purpose. I am not responsible of what you do with this tool.☆24Updated 2 years ago
- PoC - Exploit Delivery via Steganography and Polyglots, CVE-2014-0282☆53Updated last year
- extensible exploitation framework shipped on a modular multi-tasking architecture☆76Updated 3 years ago
- Python3 script to generate Office macros for the EvilOSX framework. Author: Cedric Owens☆28Updated 5 years ago
- Modern Javascript keylogger with web panel☆23Updated 5 years ago
- A Simple C&C Server Written In Python☆34Updated 7 years ago
- Social Framework☆29Updated 4 years ago
- ☆23Updated 6 years ago
- A fork of TorGhost, a little utilitly used to route all traffic through TOR.☆52Updated 5 years ago
- Empire is a PowerShell and Python 3.x post-exploitation framework.☆18Updated 5 years ago
- This is the list of all rootkits found so far on github and othersites.☆30Updated 5 years ago
- Cross platform system wide proxy server & TLS Interception library for Python☆23Updated 2 years ago
- Uses Shodan API to pull down C2 servers to run known exploits on them.☆17Updated 8 years ago
- Peap Bomb is a password sprayer for WPA/WPA2 enterprise wireless that is leveraging PEAP for Authentication.☆10Updated 4 years ago
- edge --> powerpoint --> remote-file --> shell☆11Updated 6 years ago
- IP2Tor allows to determine whether an IP address is a Tor exit node.☆30Updated 5 years ago
- Use Invoke-PSImage to deliver a payload in an Image☆53Updated 7 years ago