crorvick / outguessLinks
An unmaintained fork of the OutGuess steganographic tool. Try https://github.com/resurrecting-open-source-projects/outguess for possibly a better option.
☆157Updated 8 years ago
Alternatives and similar repositories for outguess
Users that are interested in outguess are comparing it to the libraries listed below
Sorting:
- F5 steganography☆253Updated 3 years ago
- A steganography tool for embedding payloads within Python bytecode.☆150Updated 5 years ago
- SilentEye is a cross-platform application design for an easy use of steganography☆134Updated 2 years ago
- USB mouse traffic packet forensic tool, mainly used to draw mouse movements and dragging trajectories☆272Updated last year
- A Text <-> Brainfuck/Ook webinterface☆74Updated last year
- LSB steganography and detection☆616Updated 5 years ago
- Stegdetect is an automated tool for detecting steganographic content in images.☆69Updated 3 years ago
- jphide & seek steganography tools☆86Updated 7 years ago
- ☆246Updated 2 years ago
- UNMAINTAINED. USE AT OWN RISK. Stegdetect is an automated tool for detecting steganographic content in images.☆413Updated 6 years ago
- USB键盘流量包取证工具 , 用于恢复用户的击键信息☆370Updated 10 months ago
- CRC32 tools: reverse, undo/rewind, and calculate hashes☆361Updated 11 months ago
- a little tool help CTFer solve RSA problem☆517Updated 4 years ago
- Firefox and Google Chrome Extension of HackBar without license☆168Updated 8 months ago
- Crack legacy zip encryption with Biham and Kocher's known plaintext attack. 使用明文攻击破解加密的 zip 文件☆105Updated 2 years ago
- 总结一下各路大师傅的RSA脚本233☆194Updated 7 years ago
- A Python implementation of the Wiener attack on RSA public-key encryption scheme.☆526Updated last year
- A CVE-2016-5195 exploit example.☆328Updated 8 years ago
- CTF write-ups☆33Updated 6 years ago
- RSA加密应用常见缺陷的原理与实践☆188Updated 3 years ago
- PoC for triggering buffer overflow via CVE-2020-0796☆329Updated 2 years ago
- Foremost is a console program to recover files based on their headers, footers, and internal data structures. This process is commonly re…☆330Updated 2 years ago
- 🔒 Encrypt messages with emojis using AES.☆51Updated 4 months ago
- A framework for CTF Attack with Defense Mode☆219Updated 6 years ago
- Vulnerability and exploiting☆93Updated 7 years ago
- A plugin for CTFd which allow your users to deploy a standalone instance for challenges.☆239Updated last year
- A multiple reverse shell session/client manager via terminal☆242Updated 2 years ago
- ☆53Updated 5 years ago
- A multi threads web application source leak scanner☆389Updated 2 months ago
- pkcrack with modern building tools☆195Updated 3 years ago