cryptolok / SteCoStegLinks
SteCoSteg is OutGuess successor and Vernam cipher analog in steganography.
☆56Updated 6 years ago
Alternatives and similar repositories for SteCoSteg
Users that are interested in SteCoSteg are comparing it to the libraries listed below
Sorting:
- ☆102Updated 5 years ago
- DeCryKe is a technique to transform almost any cryptographic algorithm into deniable-one, it is a decry of Russia's anti-terrorism law (a…☆23Updated 7 years ago
- An experimental project to demonstrate how a user keyboard input may be sniffed through the pattern analysis of the sounds emitted by the…☆67Updated 8 years ago
- Least-Significant-Bit tool for steganography☆80Updated 7 years ago
- An bootable 'evil maid' tool that pretends to be Windows CHKDSK☆80Updated 6 years ago
- Vocabulary Scraper script used in FLARE's analysis of Russian-language Carbanak source code☆37Updated 6 years ago
- A PoC on passing data through UNIX file privilege bits (RWX Triplets)☆27Updated 7 years ago
- File transfer via DNS☆73Updated 8 years ago
- IMAJS meet <img>☆54Updated 10 years ago
- Krack POC☆126Updated 7 years ago
- This tool help you to decryption of AES Encrypted file in very easy way.☆8Updated 2 years ago
- Keystroke injection vulnerabilities in wireless presentation clickers☆96Updated 5 years ago
- spectrum monitoring system for GSM providers☆44Updated 9 years ago
- A short and small memory forensics helper.☆52Updated 7 years ago
- ☆65Updated 8 years ago
- A GUI-based USB device fuzzer☆64Updated 7 years ago
- A shellcode testing harness.☆69Updated 11 months ago
- Fun exercises on image steganography in Python☆13Updated 7 years ago
- A RAT (Remote Administration Tool) using port-knocking techniques for *NIX systems I wrote in 2006 but still works in 2017. libpcap-based…☆48Updated 8 years ago
- a radare2 plugin that decodes packets with Scapy☆33Updated 7 years ago
- Bluetooth PIN and LINK-KEY Cracker☆51Updated 11 years ago
- A Upnp exploitation tool.☆105Updated 5 years ago
- Python Application to Reverse Freezing☆36Updated 8 years ago
- ☆48Updated 3 weeks ago
- Source code to the Malicious Demon Hunter Exploit Kit☆57Updated 10 years ago
- Detect snooper on your system!☆84Updated 8 years ago
- Malware management program and tools☆26Updated 9 years ago
- Facial Recognition and Steganography☆10Updated 5 years ago
- ☆18Updated 11 years ago
- A collection of my quick and dirty scripts for vulnerability POC and detections☆76Updated last week