computationalcore / cryptosteganographyLinks
A python steganography module to store messages or files protected with AES-256 encryption inside an image.
☆124Updated 6 months ago
Alternatives and similar repositories for cryptosteganography
Users that are interested in cryptosteganography are comparing it to the libraries listed below
Sorting:
- python hash cracker☆52Updated 10 months ago
- Create Tor hidden services in Python.☆52Updated 2 years ago
- This is the list of all rootkits found so far on github and othersites.☆30Updated 4 years ago
- Advance Image Steganography☆131Updated 3 years ago
- Proof-Of-Concept SSH Worm. Not for illegal use.☆14Updated 7 years ago
- Break rotational letter substitution (ROT) encoded text, right from your terminal.☆15Updated 2 years ago
- recover Firefox and more browsers logins☆48Updated 3 years ago
- a cli google client that bypasses captcha and rate limiting by using the google alerts "preview" feature☆48Updated 2 years ago
- A web application which detects fake news using machine learning and natural language processing techniques.☆29Updated 4 years ago
- Python implementation of the SlowLoris DoS attack.☆24Updated 8 years ago
- Secure destruction of sensitive virtual data, temporary files and swap partitions☆79Updated 2 years ago
- ☆22Updated 5 years ago
- ☆25Updated 3 years ago
- Python project to crawl and scrap the lesser known deep web or one can say dark web. Just provide the onion link and get started.☆66Updated 7 years ago
- https://bc-security.gitbook.io/empire-wiki/☆13Updated 2 years ago
- agent.btz download MALWARE BINARY PROVIDED + POC video☆17Updated 4 years ago
- A Simple C&C Server Written In Python☆34Updated 6 years ago
- IP2Tor allows to determine whether an IP address is a Tor exit node.☆30Updated 5 years ago
- edge --> powerpoint --> remote-file --> shell☆12Updated 6 years ago
- Python3 script to generate Office macros for the EvilOSX framework. Author: Cedric Owens☆27Updated 4 years ago
- 🔎 Help find Trojan Source vulnerability in code 👀 . Useful for code review in project with multiple collaborators (CI/CD)☆47Updated last year
- Programmatically extract saved passwords from Chromium based browsers.☆125Updated 3 years ago
- A wordlist-based encryption key brute forcer targeting weak key choice/derivation☆27Updated 6 years ago
- Simple mods to wpa_supplicant to allow more efficient online bruting☆19Updated 6 years ago
- Easy brute forcing to whatever you want - Jose Pino☆64Updated 10 years ago
- CryptoTrojan in Python (For educational purpose ONLY)☆50Updated 7 years ago
- Code that I adapted from the "Violent Python" book☆57Updated 11 years ago
- A simple python reverse shell written just for fun.☆64Updated 2 years ago
- web information gathering / Grab links☆43Updated 5 years ago
- Cross platform system wide proxy server & TLS Interception library for Python☆22Updated 2 years ago