danielcardeenas / AudioStego
Audio file steganography. Hides files or text inside audio files and retrieve them automatically
☆275Updated last year
Alternatives and similar repositories for AudioStego:
Users that are interested in AudioStego are comparing it to the libraries listed below
- Steganography brute-force utility to uncover hidden data inside files☆564Updated 4 years ago
- Least Significant Bit Steganography for bitmap images (.bmp and .png), WAV sound files, and byte sequences. Simple LSB Steganalysis (LSB …☆605Updated 5 months ago
- Yet another Stego Tool☆374Updated last year
- ☆635Updated last year
- A steganalysis tool for detecting LSB steganography in images☆212Updated 6 years ago
- Images to audio files with corresponding spectrograms encoder.☆267Updated 8 months ago
- Python program to steganography files into images using the Least Significant Bit.☆911Updated 2 years ago
- Execute a brute force attack with Steghide to file with hide information and password established☆119Updated 4 years ago
- A set of security related tools☆661Updated 4 years ago
- Fetch, install and search wordlist archives from websites and torrent peers.☆507Updated 11 months ago
- Simple steganography program based on the LSB method.☆117Updated last year
- Fast Steganography bruteforce tool written in Rust useful for CTF's☆245Updated 3 years ago
- An automated, modular cryptanalysis tool; i.e., a Weapon of Math Destruction☆1,099Updated 3 years ago
- RSHack - Tool for RSA CTF's challenges☆95Updated 6 years ago
- Detect hidden files and text in images☆119Updated last year
- SteCoSteg is OutGuess successor and Vernam cipher analog in steganography.☆56Updated 6 years ago
- PacketWhisper: Stealthily exfiltrate data and defeat attribution using DNS queries and text-based steganography. Avoid the problems assoc…☆628Updated 3 years ago
- CloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based S…☆1,590Updated 4 years ago
- A web-based, accessible and open-source port of StegSolve.☆338Updated 8 months ago
- Bull's Eye Wordlist Generator - Does your password rely on predictable patterns of accessible info?☆408Updated 3 years ago
- Useful CTF Tools☆273Updated 2 years ago
- A pure Python steganography module.☆541Updated 2 weeks ago
- Least-Significant-Bit tool for steganography☆79Updated 6 years ago
- Hard-to-detect image steganography☆35Updated last month
- Things we learned from Capture The Flag hacking competitions we participated in.☆249Updated 3 years ago
- Collection of steganography tools - helps with CTF challenges☆2,480Updated 2 years ago
- Software to identify the different types of hashes used to encrypt data and especially passwords☆588Updated 10 months ago
- A CTF framework to create, build, deploy and monitor challenges☆110Updated 5 months ago
- Krack POC☆124Updated 6 years ago
- Foremost is a console program to recover files based on their headers, footers, and internal data structures. This process is commonly re…☆324Updated last year