cryptolok / SteCoStegLinks
SteCoSteg is OutGuess successor and Vernam cipher analog in steganography.
☆56Updated 6 years ago
Alternatives and similar repositories for SteCoSteg
Users that are interested in SteCoSteg are comparing it to the libraries listed below
Sorting:
- Krack POC☆125Updated 7 years ago
- A steganalysis tool for detecting LSB steganography in images☆221Updated 7 years ago
- Detect hidden files and text in images☆121Updated 2 years ago
- ☆102Updated 6 years ago
- Some exploits and exploit development stuff.☆148Updated 3 years ago
- Network based protocol fuzzer☆74Updated 3 years ago
- An experimental project to demonstrate how a user keyboard input may be sniffed through the pattern analysis of the sounds emitted by the…☆67Updated 9 years ago
- a collection of Metasploit PoC exploits I wrote for IRC Botnets that allows RCE☆78Updated 2 years ago
- File transfer via DNS☆73Updated 8 years ago
- An iPhone 7 running below iOS 11 can be hijacked by a nearby hostile WiFi router.☆37Updated 7 years ago
- A Framework for Comparing Password Guessing Strategies☆127Updated 6 years ago
- IMAJS meet <img>☆54Updated 10 years ago
- A Upnp exploitation tool.☆105Updated 5 years ago
- Password Hash Identification☆220Updated 11 years ago
- A reverse shell wrapper for tor servers. Get a shell over tor via socat.☆11Updated 9 years ago
- Execute a brute force attack with Steghide to file with hide information and password established☆119Updated 4 years ago
- A shellcode testing harness.☆70Updated last year
- Colorize data file according to repetitive chunks, typical in ECB encrypted☆45Updated 4 years ago
- Just random files I've stored here for people to get access to because wordpress doesn't like python.☆83Updated 3 years ago
- Audible Electromagnetic Interference Detector - Model ET-1☆14Updated 5 years ago
- Twitter as an extra entropy source☆104Updated 7 years ago
- Least-Significant-Bit tool for steganography☆81Updated 7 years ago
- simple shellcode generator☆114Updated 8 years ago
- Truehunter☆31Updated 4 years ago
- a tool to determine the crypto/encoding algorithm used according to traces from its representation☆134Updated 4 years ago
- Simple script you can use to convert and obscure any IP address of any host.☆111Updated 3 years ago
- Neto | A tool to analyse browser extensions☆88Updated 4 years ago
- Clone of hidden tear written in C++☆70Updated 4 years ago
- DeCryKe is a technique to transform almost any cryptographic algorithm into deniable-one, it is a decry of Russia's anti-terrorism law (a…☆23Updated 7 years ago
- A tool that enumerates Android devices for information useful in understanding its internals and for exploit development. It supports and…☆54Updated 7 years ago