djhworld / stegtool
Steganography tool
☆52Updated 4 years ago
Alternatives and similar repositories for stegtool
Users that are interested in stegtool are comparing it to the libraries listed below
Sorting:
- Steganography library☆30Updated 4 years ago
- edgedressing leverages a Windows "feature" in order to force a target's Edge browser to open. This browser is then directed to a URL of …☆51Updated 5 months ago
- ld_preload userland rootkit☆34Updated 4 years ago
- Generate graphs with NetworkX, natively visualize with D3.js and pywebview☆70Updated 4 years ago
- A bash script that automates the exfiltration of data over dns in case we have blind command execution on a server with egress filtering☆210Updated 4 years ago
- compile/run for the lazy☆82Updated 4 years ago
- ☆65Updated 5 years ago
- Encryption tool that's heavily inspired by the Rubberhose file system (https://en.wikipedia.org/wiki/Rubberhose_(file_system)).☆53Updated 3 years ago
- render sprites into your desktop environment as shaped windows using GTK☆20Updated 3 years ago
- GitHub Actions at your fingertips! ✨☆32Updated 4 years ago
- A list of backdoor samples I find online.☆13Updated 5 years ago
- A small utility that aims to automate and simplify some tasks related to software release cycles.☆43Updated 4 years ago
- Web on top of any protocol☆114Updated 5 years ago
- General Research Repository - Only updated when I feel like it☆28Updated 6 months ago
- PageBuster - dump all executable pages of packed processes.☆203Updated 4 years ago
- CVE-2018-20377; 20575; 20576; 20577 Multiple security vulnerabilities affecting latest firmware release on ORANGE Livebox modems.☆74Updated last year
- Turing-complete esoteric programming language, storing source code in DNS MX Records. Written in Go.☆14Updated last year
- Yet Another Sniffer for monitoring network traffic☆85Updated 3 years ago
- A proof-of-concept for a read-only filesystem with random contents generated on demand.☆38Updated 3 years ago
- evil mass storage *AT90USBKEY2 (poc-malware-tool for offline system)☆31Updated last year
- ☆128Updated 2 years ago
- Corewars but within r2☆58Updated 11 months ago
- Slides for Reverse Engineering 101 in 20 minutes as presented at Pancakes Con☆125Updated 5 years ago
- trustor (PoC)☆25Updated 3 years ago
- Codename generator using WordNet parts of speech database☆27Updated 3 years ago
- Utility to find hidden Linux kernel modules☆144Updated 5 months ago
- Tool for profiling heap usage and memory management☆27Updated 3 years ago
- Seer is a tool that recognizes the architecture of a binary file☆102Updated 3 years ago
- Let's brute force this hotel's tv.☆78Updated 5 years ago
- GPU rootkit PoC by Team Jellyfish☆120Updated 9 years ago