crorvick / outguess
An unmaintained fork of the OutGuess steganographic tool. Try https://github.com/resurrecting-open-source-projects/outguess for possibly a better option.
☆152Updated 7 years ago
Alternatives and similar repositories for outguess:
Users that are interested in outguess are comparing it to the libraries listed below
- A steganography tool for embedding payloads within Python bytecode.☆142Updated 5 years ago
- UNMAINTAINED. USE AT OWN RISK. Stegdetect is an automated tool for detecting steganographic content in images.☆409Updated 6 years ago
- F5 steganography☆241Updated 3 years ago
- Stegdetect is an automated tool for detecting steganographic content in images.☆69Updated 2 years ago
- A Text <-> Brainfuck/Ook webinterface☆73Updated 6 months ago
- SilentEye is a cross-platform application design for an easy use of steganography☆118Updated last year
- ☆206Updated last year
- USB键盘流量包取证工具 , 用于恢复用户的击键信息☆342Updated 3 months ago
- CTF write-ups☆33Updated 5 years ago
- PCRT (PNG Check & Repair Tool), a tool to help check and fix the error in a PNG image.☆233Updated 2 years ago
- USB mouse traffic packet forensic tool, mainly used to draw mouse movements and dragging trajectories☆249Updated 8 months ago
- PoC for triggering buffer overflow via CVE-2020-0796☆322Updated last year
- jphide & seek steganography tools☆85Updated 7 years ago
- CTF platfrom(Team Version) developed by Jarvis from Phrack Team. 做一个功能最全的CTF平台。☆189Updated 6 years ago
- Multi-language web CGI interfaces exploits.☆389Updated 2 years ago
- exp for https://research.checkpoint.com/extracting-code-execution-from-winrar☆488Updated 5 years ago
- RSA加密应用常见缺陷的原理与实践☆185Updated 2 years ago
- Simple tool to crack VMware VMX encryption passwords☆67Updated 5 months ago
- A Python implementation of the Wiener attack on RSA public-key encryption scheme.☆513Updated 10 months ago
- a little tool help CTFer solve RSA problem☆508Updated 4 years ago
- Create a TCP circuit through validly formed HTTP requests☆344Updated 7 years ago
- Compile foremost for windows so it can run without cygwin. Check README for instruction to compile for windows.☆104Updated 8 years ago
- A framework for CTF Attack with Defense Mode☆218Updated 6 years ago
- ☆49Updated 5 years ago
- A login bypass(CVE-2019-18371) and a command injection vulnerability(CVE-2019-18370) in Xiaomi Router R3G up to version 2.28.23.☆182Updated 5 years ago
- CRC32 tools: reverse, undo/rewind, and calculate hashes☆346Updated 3 months ago
- Foremost is a console program to recover files based on their headers, footers, and internal data structures. This process is commonly re…☆321Updated last year
- Script to recover mt_rand()'s seed with only two outputs and without any bruteforce.☆149Updated 5 years ago
- bluekeep exploit☆129Updated 3 years ago