computationalcore / cryptosteganographyLinks
A python steganography module to store messages or files protected with AES-256 encryption inside an image.
☆123Updated 5 months ago
Alternatives and similar repositories for cryptosteganography
Users that are interested in cryptosteganography are comparing it to the libraries listed below
Sorting:
- python hash cracker☆52Updated 9 months ago
- pArAnoIA - Tiny "Secure" Browser☆12Updated 9 months ago
- A simple python reverse shell written just for fun.☆65Updated 2 years ago
- Reverse Shell with Python 3☆27Updated 4 years ago
- recover Firefox and more browsers logins☆50Updated 3 years ago
- This is the list of all rootkits found so far on github and othersites.☆30Updated 4 years ago
- Python 3 Reverse Shell☆27Updated 3 years ago
- Simple script to convert and obscure any IP address of any host.☆23Updated 7 years ago
- Cross platform system wide proxy server & TLS Interception library for Python☆22Updated 2 years ago
- Code that I adapted from the "Violent Python" book☆57Updated 11 years ago
- Generate CIA/NSA style project codenames☆22Updated 7 years ago
- Asleap - Cisco LEAP and Generic MS-CHAPv2 Dictionary Attack☆87Updated 4 years ago
- ☆29Updated 5 years ago
- A web application which detects fake news using machine learning and natural language processing techniques.☆29Updated 4 years ago
- Empire is a PowerShell and Python 3.x post-exploitation framework.☆18Updated 5 years ago
- Use Invoke-PSImage to deliver a payload in an Image☆52Updated 7 years ago
- A Simple C&C Server Written In Python☆34Updated 6 years ago
- Simple CLI script to check if you have a password that has been compromised in a data breach.☆55Updated 2 months ago
- Get clients and access points.☆49Updated 6 years ago
- SubZone - Subdomains, Dns records, & more! || Python tutorial || Certificate authority abuse || Adavnced || Hacking/Info-Sec ||☆42Updated 4 months ago
- Proof-Of-Concept SSH Worm. Not for illegal use.☆14Updated 7 years ago
- SteCoSteg is OutGuess successor and Vernam cipher analog in steganography.☆56Updated 6 years ago
- Command line interface to interact with hashes.com escrow service.☆37Updated last month
- extensible exploitation framework shipped on a modular multi-tasking architecture☆77Updated 2 years ago
- ☆23Updated 5 years ago
- A lightweight/secure honeypot using Lua scripts.☆25Updated 4 years ago
- Uses Shodan API to pull down C2 servers to run known exploits on them.☆18Updated 7 years ago
- Python3 script to generate Office macros for the EvilOSX framework. Author: Cedric Owens☆27Updated 4 years ago
- A fork of TorGhost, a little utilitly used to route all traffic through TOR.☆52Updated 5 years ago
- Selenium based web scraper to generate passwords list☆51Updated 5 years ago