danielcardeenas / AudioStegoLinks
Audio file steganography. Hides files or text inside audio files and retrieve them automatically
☆291Updated 2 years ago
Alternatives and similar repositories for AudioStego
Users that are interested in AudioStego are comparing it to the libraries listed below
Sorting:
- Steganography brute-force utility to uncover hidden data inside files☆587Updated 5 years ago
- Least Significant Bit Steganography for bitmap images (.bmp and .png), WAV sound files, and byte sequences. Simple LSB Steganalysis (LSB …☆642Updated 3 months ago
- Images to audio files with corresponding spectrograms encoder.☆276Updated last year
- ☆695Updated last year
- Detect hidden files and text in images☆126Updated 2 years ago
- Yet another Stego Tool☆401Updated 2 years ago
- Imago is a python tool that extract digital evidences from images.☆265Updated 4 years ago
- Execute a brute force attack with Steghide to file with hide information and password established☆121Updated 5 years ago
- A steganalysis tool for detecting LSB steganography in images☆231Updated 7 years ago
- Fresh Onions is an open source TOR spider / hidden service onion crawler hosted at zlal32teyptf4tvi.onion☆534Updated 5 years ago
- Fetch, install and search wordlist archives from websites and torrent peers.☆531Updated last year
- Python program to steganography files into images using the Least Significant Bit.☆949Updated 3 years ago
- Automated image forensics tool☆525Updated 9 years ago
- CrackStation.net's Lookup Table Implementation.☆401Updated 7 years ago
- Fast Steganography bruteforce tool written in Rust useful for CTF's☆246Updated 7 months ago
- bettercap's web UI☆356Updated 5 months ago
- Bull's Eye Wordlist Generator - Does your password rely on predictable patterns of accessible info?☆418Updated 4 years ago
- Bluesniff☆88Updated 10 years ago
- Python script to crack hashes using online services☆89Updated 4 years ago
- Sets Transparent proxy tunnel through Tor, I2P, Privoxy, Polipo and modify DNS; Include Anonymizing Relay Monitor (arm), macchanger and w…☆317Updated 3 years ago
- netdiscover☆403Updated 3 years ago
- SteCoSteg is OutGuess successor and Vernam cipher analog in steganography.☆56Updated 6 years ago
- A set of security related tools☆685Updated 4 years ago
- CloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based S…☆1,647Updated 5 years ago
- Mirror of Shadowbrokers release from https://steemit.com/shadowbrokers/@theshadowbrokers/lost-in-translation☆486Updated 8 years ago
- 🔓Crack hashes using online rainbow & lookup table attack services, right from your terminal.☆234Updated 3 years ago
- Collection of steganography tools - helps with CTF challenges☆2,631Updated 3 years ago
- anti-forensic tool that writes udev rules for known usb devices and do some things at unknown usb insertion or specific usb device remova…☆129Updated 8 years ago
- A POSIX-compliant, fully automated WPA PSK PMKID and handshake capture script aimed at penetration testing☆361Updated 5 months ago
- Prevent RubberDucky (or other keystroke injection) attacks☆529Updated last year