cryptolok / SteCoSteg
SteCoSteg is OutGuess successor and Vernam cipher analog in steganography.
☆56Updated 6 years ago
Alternatives and similar repositories for SteCoSteg:
Users that are interested in SteCoSteg are comparing it to the libraries listed below
- ssh public host key scanner using shodan☆117Updated 5 years ago
- Execute a brute force attack with Steghide to file with hide information and password established☆119Updated 4 years ago
- IMAJS meet <img>☆54Updated 9 years ago
- A tool that enumerates Android devices for information useful in understanding its internals and for exploit development. It supports and…☆51Updated 7 years ago
- Proof-of-concept of the KRACK attack against Linux and Android☆154Updated 7 years ago
- unarcrypto is an educational tool to depict cryptography usage in zip, rar and 7zip archives☆96Updated 6 years ago
- Scan/Exploit Blueborne CVE-2017-0785☆30Updated 7 years ago
- This tool help you to decryption of AES Encrypted file in very easy way.☆8Updated 2 years ago
- A python based dropper, that uses steganography and an image over http to transfer a file☆58Updated 9 years ago
- Colorize data file according to repetitive chunks, typical in ECB encrypted☆44Updated 4 years ago
- Python tools for interacting with a DarkComet Client☆54Updated 9 years ago
- A shellcode testing harness.☆69Updated 8 months ago
- Source code to the Malicious Demon Hunter Exploit Kit☆57Updated 9 years ago
- Least-Significant-Bit tool for steganography☆79Updated 6 years ago
- Krack POC☆124Updated 6 years ago
- A steganalysis tool for detecting LSB steganography in images☆212Updated 6 years ago
- An experimental project to demonstrate how a user keyboard input may be sniffed through the pattern analysis of the sounds emitted by the…☆67Updated 8 years ago
- ☆104Updated 3 years ago
- Purposely vulnerable ActiveX Control to teach about exploitation in a browser-based environment.☆69Updated 10 years ago
- Twitter as an extra entropy source☆100Updated 6 years ago
- Monitoring 'DNS' inside the Tor network☆92Updated 8 years ago
- Public exploits (re)writed while learning.☆59Updated 11 years ago
- An iPhone 7 running below iOS 11 can be hijacked by a nearby hostile WiFi router.☆36Updated 7 years ago
- Detect snooper on your system!☆83Updated 8 years ago
- A python based https remote access trojan for penetration testing☆84Updated 9 years ago
- Bluetooth scanner for local devices that may be vulnerable to Blueborne exploit☆152Updated 7 years ago
- An example chrome extension to demonstrate the dangers of injecting javascript and html into a page☆35Updated 7 years ago
- Extract all forensic interesting information of Firefox, Iceweasel and Seamonkey browsers☆132Updated 3 years ago
- Some exploits and exploit development stuff.☆147Updated 3 years ago
- AM radio data exfiltration with CPU cache in assembly☆19Updated last year