danielcardeenas / AudioStegoLinks
Audio file steganography. Hides files or text inside audio files and retrieve them automatically
☆294Updated 2 years ago
Alternatives and similar repositories for AudioStego
Users that are interested in AudioStego are comparing it to the libraries listed below
Sorting:
- Steganography brute-force utility to uncover hidden data inside files☆581Updated 4 years ago
- Least Significant Bit Steganography for bitmap images (.bmp and .png), WAV sound files, and byte sequences. Simple LSB Steganalysis (LSB …☆636Updated 2 months ago
- Yet another Stego Tool☆398Updated 2 years ago
- Images to audio files with corresponding spectrograms encoder.☆278Updated last year
- ☆689Updated last year
- Detect hidden files and text in images☆123Updated 2 years ago
- Python program to steganography files into images using the Least Significant Bit.☆946Updated 3 years ago
- Execute a brute force attack with Steghide to file with hide information and password established☆121Updated 5 years ago
- A steganalysis tool for detecting LSB steganography in images☆229Updated 7 years ago
- Fetch, install and search wordlist archives from websites and torrent peers.☆524Updated last year
- Fast Steganography bruteforce tool written in Rust useful for CTF's☆248Updated 5 months ago
- Fresh Onions is an open source TOR spider / hidden service onion crawler hosted at zlal32teyptf4tvi.onion☆532Updated 5 years ago
- bettercap's web UI☆350Updated 3 months ago
- Tor Iptables script is an anonymizer that sets up iptables and tor to route all services and traffic including DNS through the Tor networ…☆486Updated 4 months ago
- A set of security related tools☆679Updated 4 years ago
- CrackStation.net's Lookup Table Implementation.☆400Updated 7 years ago
- netdiscover☆404Updated 3 years ago
- CloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based S…☆1,646Updated 5 years ago
- A POSIX-compliant, fully automated WPA PSK PMKID and handshake capture script aimed at penetration testing☆360Updated 3 months ago
- Password cracking rules and masks for hashcat that I generated from cracked passwords.☆559Updated 8 years ago
- Bull's Eye Wordlist Generator - Does your password rely on predictable patterns of accessible info?☆418Updated 4 years ago
- An all-in-one WPA/WPS toolkit☆426Updated 2 years ago
- Collection of steganography tools - helps with CTF challenges☆2,579Updated 3 years ago
- SteCoSteg is OutGuess successor and Vernam cipher analog in steganography.☆56Updated 6 years ago
- WIFI Client Detection - Identify people by assigning a name to a device performing a wireless probe request.☆243Updated 5 years ago
- steganography project for rowdy hacks 2019 hackathon☆20Updated 3 years ago
- ☠ Man-in-the-middle wireless access point inside a docker container 🐳☆449Updated 7 years ago
- ☆132Updated 6 years ago
- High-Performance word generator with a per-position configureable charset☆487Updated 3 years ago
- Foremost is a console program to recover files based on their headers, footers, and internal data structures. This process is commonly re…☆342Updated 2 years ago