gabrielhribeiro / SteganocryptoLinks
Steganography( LSB IMAGES ) using AES Cryptography together
☆13Updated 10 years ago
Alternatives and similar repositories for Steganocrypto
Users that are interested in Steganocrypto are comparing it to the libraries listed below
Sorting:
- Python Steganography data hiding in image☆10Updated 3 years ago
- Botnet IRC C&C Created in python language, developed for language learning☆12Updated 9 years ago
- Força bruta em formulários web.☆19Updated 10 years ago
- Embeds messages into images using the Least Significant Bit algorithm☆11Updated 2 years ago
- Ransomeware☆46Updated 7 years ago
- some python3 functions to add spreading features to any python backdoor☆55Updated 8 years ago
- Implementation of LSB Steganography technique in Python 3. It also includes a GUI implementation.☆14Updated 5 years ago
- Information Security using Steganography over Cryptography☆14Updated last year
- C&C Botnet written in Python with fabric☆34Updated 3 years ago
- A basic example of how to use Least Significant Bit steganography on a BMP image☆15Updated 2 years ago
- Bind 2 exe's and have them run at the same time.☆47Updated 10 years ago
- Used to do complete Steganography analysis of an image. This tool will help the user to detect any hidden text or message in the image an…☆11Updated 6 years ago
- Bot simples para manter acesso em máquinas Windows.☆29Updated 10 years ago
- python client/server keystroke logger☆23Updated 12 years ago
- Python code to extract chrome cookie, history and login data files☆59Updated 7 years ago
- A ctypes powered python keylogger.☆107Updated 5 years ago
- Simple Linux RootKit written in python☆10Updated 7 years ago
- A python based dropper, that uses steganography and an image over http to transfer a file☆59Updated 9 years ago
- Shutdown 2017 Malware (Worm - Ransomware - Rogue Security Software) - Includes AHXR-ScreenLock (Screen Lock Builder - Kills Task Manager…☆60Updated 7 years ago
- A Python program that scans RAM.☆40Updated 10 years ago
- Simple python malware for back connect in windows☆58Updated 7 years ago
- A simple worm that uses brute force and dictionary attacks through the network to infect vulnerable machines☆29Updated 9 years ago
- An IRC bot written in Python.☆74Updated last week
- Bug7sec Team - ransomware open source (web)☆132Updated 8 years ago
- Source code to the Malicious Demon Hunter Exploit Kit☆57Updated 10 years ago
- Malware Dump☆20Updated 8 years ago
- Linux backdoor implementation written in Python☆58Updated 10 years ago
- PhishLog is a penetration testing and red teaming tool that automates the setup of a live keylogger that could be used with phishing camp…☆30Updated 6 years ago
- scripts to create zip bombs☆12Updated 12 years ago
- Linux kernel level keylogger that uses Twitter as a covert channel to get information of keystrokes and user data into the attacker using…☆11Updated 2 years ago