computationalcore / cryptosteganography
A python steganography module to store messages or files protected with AES-256 encryption inside an image.
☆121Updated this week
Alternatives and similar repositories for cryptosteganography:
Users that are interested in cryptosteganography are comparing it to the libraries listed below
- Implementation Hide Text In Image with encryption☆46Updated 5 years ago
- Linked Pixel Steganography (LPS) technique is a variant of the well-known LSB steganography. It can be applied to any type of images.☆18Updated last year
- fanny.bmp MALWARE - ONLY FOR ACADEMICAL RESEARCH AND EDUCATIONAL PURPOSES! (incl Metasploit detection Module)☆39Updated 10 months ago
- Reverse Shell with Python 3☆27Updated 4 years ago
- edge --> powerpoint --> remote-file --> shell☆12Updated 5 years ago
- C# Service that blocks the computer at unauthorized USB introduction☆24Updated 5 years ago
- A cross-platform stager for SILENTTRINITY (https://github.com/byt3bl33d3r/SILENTTRINITY)☆24Updated 5 years ago
- A python script for digital image steganography using Fast Fourier Transform.☆9Updated 6 months ago
- Secure open-source password manager.☆12Updated 3 years ago
- A collection of awesome readme templates to display on your profile☆17Updated 4 years ago
- Stupid simple XOR encryption utility☆33Updated 3 weeks ago
- Simple script to convert and obscure any IP address of any host.☆21Updated 7 years ago
- A netcat alternative with remote code execution.☆38Updated 4 years ago
- Embeds messages into images using the Least Significant Bit algorithm☆11Updated 2 years ago
- Simple CLI script to check if you have a password that has been compromised in a data breach.☆54Updated 4 months ago
- Use md5-collisions to make evil executables looking like a good one.☆29Updated 4 years ago
- Python bindings for hashcat☆32Updated 3 years ago
- Tool developed in Python 3 using Scapy for MITM attacks☆11Updated 4 years ago
- Detects and extracts images from Goerli Testnet blockchain☆24Updated 3 years ago
- Detect hidden files and text in images☆119Updated last year
- Penetration Testing with Shellcode, published by Packt☆36Updated 2 years ago
- DNS hijacking via dead records automation tool☆51Updated 4 years ago
- CryptoTrojan in Python (For educational purpose ONLY)☆47Updated 6 years ago
- python hash cracker☆52Updated 3 months ago
- A wordlist-based encryption key brute forcer targeting weak key choice/derivation☆27Updated 6 years ago
- ☆19Updated 4 years ago
- Basic Dart reverse shell code☆21Updated last year
- A generator for malicious DLL files for DLL Hijacking attacks☆32Updated 5 years ago
- My Python Cookiecutter project template☆30Updated 2 years ago
- "Zero Click" Remote Code Execution in Mycroft AI vocal assistant☆52Updated 6 years ago