djhworld / stegtool
Steganography tool
☆52Updated 4 years ago
Alternatives and similar repositories for stegtool:
Users that are interested in stegtool are comparing it to the libraries listed below
- Steganography library☆30Updated 4 years ago
- Generate graphs with NetworkX, natively visualize with D3.js and pywebview☆70Updated 4 years ago
- scrapped ideas and garbage code☆13Updated 3 years ago
- General Research Repository - Only updated when I feel like it☆28Updated 5 months ago
- Encryption tool that's heavily inspired by the Rubberhose file system (https://en.wikipedia.org/wiki/Rubberhose_(file_system)).☆53Updated 3 years ago
- Seer is a tool that recognizes the architecture of a binary file☆102Updated 2 years ago
- Web on top of any protocol☆114Updated 4 years ago
- compile/run for the lazy☆82Updated 4 years ago
- An ascii-art physics puzzle, roll around your terminal collecting ascii-art objects!☆44Updated 2 years ago
- Corewars but within r2☆58Updated 9 months ago
- Notes regarding CVE-2021-3156: Heap-Based Buffer Overflow in Sudo☆38Updated 4 years ago
- A small utility that aims to automate and simplify some tasks related to software release cycles.☆43Updated 3 years ago
- ☆19Updated 4 years ago
- A WASM CTF Challenge☆17Updated 5 years ago
- Let's brute force this hotel's tv.☆77Updated 5 years ago
- Tool for profiling heap usage and memory management☆27Updated 3 years ago
- Demonstrate ability to read memfd_secret() data from the kernel☆58Updated last year
- ☆128Updated 2 years ago
- render sprites into your desktop environment as shaped windows using GTK☆20Updated 3 years ago
- Tool to examine the behaviour of setuid binaries under constrained limits.☆62Updated 3 years ago
- Diebold Accuvote-TSx Election Machine Hacking☆39Updated 5 years ago
- Binary file entropy visualizer written in Python☆54Updated last month
- SHA256 sentence: discover a SHA256 checksum that matches a sentence's description of hex digit words.☆21Updated last year
- Abusing Cloudflare Workers to establish persistence and exfiltrate sensitive data at the edge.☆16Updated 2 years ago
- A list of backdoor samples I find online.☆13Updated 5 years ago
- Python 2.7 bytecode d̶e̶o̶b̶f̶u̶s̶c̶a̶t̶o̶r unfucker☆200Updated last year
- ☆27Updated 3 years ago
- ☆21Updated 3 years ago
- evil mass storage *AT90USBKEY2 (poc-malware-tool for offline system)☆30Updated last year
- ☆11Updated 3 years ago