cryptolok / SteCoSteg
SteCoSteg is OutGuess successor and Vernam cipher analog in steganography.
☆55Updated 5 years ago
Related projects ⓘ
Alternatives and complementary repositories for SteCoSteg
- Execute a brute force attack with Steghide to file with hide information and password established☆117Updated 4 years ago
- A steganalysis tool for detecting LSB steganography in images☆201Updated 6 years ago
- A shellcode testing harness.☆68Updated 4 months ago
- This tool help you to decryption of AES Encrypted file in very easy way.☆8Updated last year
- Utilize Pastebin's scraping API to find interesting pastes.☆16Updated 5 years ago
- Least-Significant-Bit tool for steganography☆78Updated 6 years ago
- Just random files I've stored here for people to get access to because wordpress doesn't like python.☆84Updated 2 years ago
- Cryptanalysis library for breaking classical ciphers☆26Updated 5 years ago
- A RAT (Remote Administration Tool) using port-knocking techniques for *NIX systems I wrote in 2006 but still works in 2017. libpcap-based…☆48Updated 7 years ago
- An bootable 'evil maid' tool that pretends to be Windows CHKDSK☆79Updated 5 years ago
- Clone of hidden tear written in C++☆69Updated 4 years ago
- A tool that enumerates Android devices for information useful in understanding its internals and for exploit development. It supports and…☆50Updated 7 years ago
- ☆102Updated 5 years ago
- Truehunter☆30Updated 3 years ago
- ☆36Updated 8 years ago
- LOCAL ROOT EXPLOITS☆37Updated 6 years ago
- Under Your Radar (UYR): Exfiltration using Steganography☆18Updated 9 years ago
- A reverse shell wrapper for tor servers. Get a shell over tor via socat.☆11Updated 8 years ago
- Colorize data file according to repetitive chunks, typical in ECB encrypted☆43Updated 3 years ago
- An experimental project to demonstrate how a user keyboard input may be sniffed through the pattern analysis of the sounds emitted by the…☆67Updated 8 years ago
- Public exploits (re)writed while learning.☆59Updated 11 years ago
- IMAJS meet <img>☆54Updated 9 years ago
- Asleap - Cisco LEAP and Generic MS-CHAPv2 Dictionary Attack☆83Updated 3 years ago
- Automated Cyber Offense☆88Updated 5 years ago
- Twitter as an extra entropy source☆98Updated 6 years ago
- Locker Decrypter - Python tool to decrypt files encrypted by Locker malware☆18Updated 9 years ago
- Program for cryptanalyzing xor "encryption" with variable key length☆42Updated 15 years ago