danielcardeenas / AudioStegoLinks
Audio file steganography. Hides files or text inside audio files and retrieve them automatically
☆286Updated 2 years ago
Alternatives and similar repositories for AudioStego
Users that are interested in AudioStego are comparing it to the libraries listed below
Sorting:
- Steganography brute-force utility to uncover hidden data inside files☆574Updated 4 years ago
- Least Significant Bit Steganography for bitmap images (.bmp and .png), WAV sound files, and byte sequences. Simple LSB Steganalysis (LSB …☆627Updated 10 months ago
- Yet another Stego Tool☆389Updated 2 years ago
- Detect hidden files and text in images☆120Updated 2 years ago
- Images to audio files with corresponding spectrograms encoder.☆274Updated last year
- Execute a brute force attack with Steghide to file with hide information and password established☆119Updated 4 years ago
- ☆655Updated last year
- Fetch, install and search wordlist archives from websites and torrent peers.☆516Updated last year
- A steganalysis tool for detecting LSB steganography in images☆220Updated 6 years ago
- Bull's Eye Wordlist Generator - Does your password rely on predictable patterns of accessible info?☆415Updated 4 years ago
- Fresh Onions is an open source TOR spider / hidden service onion crawler hosted at zlal32teyptf4tvi.onion☆522Updated 5 years ago
- A set of security related tools☆668Updated 4 years ago
- Least-Significant-Bit tool for steganography☆81Updated 7 years ago
- SteCoSteg is OutGuess successor and Vernam cipher analog in steganography.☆56Updated 6 years ago
- CrackStation.net's Lookup Table Implementation.☆388Updated 6 years ago
- Scan .onion hidden services with nmap using Tor, proxychains and dnsmasq in a minimal alpine Docker container.☆514Updated 7 years ago
- bettercap's web UI☆343Updated 8 months ago
- 🔓 A dynamic dictionary merger for successful dictionary based attacks.☆225Updated 3 years ago
- RSHack - Tool for RSA CTF's challenges☆97Updated 6 years ago
- Fast Steganography bruteforce tool written in Rust useful for CTF's☆246Updated last month
- Borrow CPU cycles from visitor's web browsers to crack MD5 password hashes 😲☆187Updated 4 years ago
- Python Pastebin Webcrawler that returns list of public pastebins containing keywords☆435Updated 3 years ago
- Imago is a python tool that extract digital evidences from images.☆261Updated 3 years ago
- Prevent RubberDucky (or other keystroke injection) attacks☆525Updated last year
- Python script to crack hashes using online services☆89Updated 4 years ago
- Password cracking rules and masks for hashcat that I generated from cracked passwords.☆554Updated 8 years ago
- Script made with Python, it shows the geolocation of a BSSID from an AP, using an API☆21Updated 7 years ago
- Ultimate Network Stealther that makes Linux a Ghost In The Net and protects from MITM/DOS/scan☆373Updated 2 years ago
- A CTF framework to create, build, deploy and monitor challenges☆116Updated 3 months ago
- Ability to detect suspicious activity such as (WEP/WPA/WPS) attack by sniffing the air for wireless packets.☆268Updated 11 years ago