Python steganography tool to hide images or text in images
☆439Nov 9, 2019Updated 6 years ago
Alternatives and similar repositories for Matroschka
Users that are interested in Matroschka are comparing it to the libraries listed below
Sorting:
- A tool for scrapping the possible malware from the Wikileaks AKP leak☆101Oct 24, 2016Updated 9 years ago
- LLDB MCP Integration + other helpful commands☆740Mar 29, 2025Updated 11 months ago
- 📡 A python program to create a fake AP and sniff data.☆1,691Nov 3, 2019Updated 6 years ago
- A Python stream processing engine modeled after Yahoo! Pipes☆1,601Dec 28, 2021Updated 4 years ago
- UDPack is an extensible generic UDP packet obfuscator.☆21Jul 27, 2019Updated 6 years ago
- An OpenCV based document scanner☆823Aug 20, 2016Updated 9 years ago
- WarBerryPi - Tactical Exploitation☆2,224Nov 9, 2019Updated 6 years ago
- BinProxy is a proxy for arbitrary TCP connections. You can define custom message formats using the BinData gem.☆176Dec 1, 2022Updated 3 years ago
- Poison, reset, spoof, redirect MITM script☆126Aug 5, 2023Updated 2 years ago
- A post-exploitation powershell tool for extracting juicy info from memory.☆1,863Jun 28, 2024Updated last year
- Next Generation Firewall Audit and Bypass Tool☆266Apr 24, 2017Updated 8 years ago
- A pythonic wrapper over `atd` to schedule deletion of files/directories.☆53Aug 6, 2017Updated 8 years ago
- How to backdoor Diffie-Hellman☆613Aug 20, 2016Updated 9 years ago
- OS X malloc introspection tool☆322Oct 14, 2023Updated 2 years ago
- online port scan scraper☆1,120Aug 7, 2023Updated 2 years ago
- (extensible) Data Exfiltration Toolkit (DET)☆827Nov 3, 2017Updated 8 years ago
- Blaze Telegram Backdoor Toolkit is a post-exploitation tool that leverages the infrastructure of Telegram as a C&C☆206Sep 6, 2018Updated 7 years ago
- SSMA - Simple Static Malware Analyzer [This project is not maintained anymore by me]☆410Apr 21, 2020Updated 5 years ago
- A microservice for archiving the news.☆164May 22, 2016Updated 9 years ago
- Automatic collect firmwares from internet,decompress,find binary code,extract info,file relation and function relation☆40Feb 13, 2017Updated 9 years ago
- A Ruby based tool that converts a simple passphrase into a secure password☆19Oct 9, 2018Updated 7 years ago
- black hat Asia 2017 Slides☆22Mar 30, 2017Updated 8 years ago
- ☆22Aug 31, 2016Updated 9 years ago
- A lightweight VM for hardware hacking, RE (fuzzing, symEx, exploiting etc) and wargaming tasks☆355Sep 4, 2019Updated 6 years ago
- pentest framework☆1,243Feb 21, 2019Updated 7 years ago
- A modular distributed penetration testing tool.☆41Dec 21, 2016Updated 9 years ago
- DNS Exfiltration tool for stealthily sending files over DNS requests.☆1,732Feb 3, 2022Updated 4 years ago
- NXcrypt - 'python backdoor' framework☆366Jun 26, 2017Updated 8 years ago
- Started as arbitrary System Management Mode code execution exploit for Lenovo ThinkPad model line, ended as exploit for industry-wide 0da…☆700May 13, 2022Updated 3 years ago
- Malspider is a web spidering framework that detects characteristics of web compromises.☆417Nov 4, 2022Updated 3 years ago
- InjectProc - Process Injection Techniques [This project is not maintained anymore]☆998Feb 10, 2019Updated 7 years ago
- Command line tool to share your UNIX terminal and forward local TCP ports to people you trust.☆2,765Apr 6, 2021Updated 4 years ago
- Fuzzing tool written in Golang. Insane monkey not included.☆12Feb 22, 2018Updated 8 years ago
- Exploit kit analyzer☆22Mar 3, 2015Updated 11 years ago
- Portable utility to check if a machine has been infected by Shamoon2☆15Jan 13, 2017Updated 9 years ago
- Inject malicious code into *.debs☆284Apr 26, 2022Updated 3 years ago
- Generate links that users can use to submit messages encrypted with your public key.☆955Dec 9, 2024Updated last year
- AutoBrowser Screenshot☆49Oct 27, 2016Updated 9 years ago
- 🔑🔥📈 Next Level PGP☆3,468Mar 27, 2019Updated 6 years ago