gabrielhribeiro / Steganocrypto
Steganography( LSB IMAGES ) using AES Cryptography together
☆12Updated 10 years ago
Related projects ⓘ
Alternatives and complementary repositories for Steganocrypto
- A basic example of how to use Least Significant Bit steganography on a BMP image☆15Updated last year
- Bot simples para manter acesso em máquinas Windows.☆29Updated 9 years ago
- Script in Perl for Bypass CloudFlare [DEPRECATED]☆13Updated 8 years ago
- Send Attack Web Forms☆36Updated 3 years ago
- Under Your Radar (UYR): Exfiltration using Steganography☆18Updated 9 years ago
- Dorker, programa utilizado para automatizar pesquisas em buscadores, faz uso de alguns filtros.☆16Updated 8 years ago
- Python Powered Repository☆16Updated 4 years ago
- Man in the middle automated attacks☆20Updated 8 years ago
- Interactive python script for exploiting WPS on access points. Works well with Kali 2.0. (Disclaimer: I'm not responsible for any illeg…☆10Updated 8 years ago
- SPIP (CMS) Scanner for penetration testing purpose written in Python☆70Updated 10 years ago
- Knowledge space for some computerforensic stuff☆14Updated 10 years ago
- Telegram BotNet☆34Updated 11 months ago
- Embeds messages into images using the Least Significant Bit algorithm☆11Updated last year
- Botnet IRC C&C Created in python language, developed for language learning☆12Updated 8 years ago
- This program focuses on automating the download, installation and compilation of pentest tools from source☆33Updated 6 years ago
- Telegram Bot to manage botnets created with struts vulnerability(CVE-2017-5638)☆41Updated 3 years ago
- Amarula Python Botnet☆9Updated 5 years ago
- Post-Exploitation Framework☆75Updated 7 years ago
- Reverse Shell over TCP backdoor☆50Updated 5 years ago
- Scanning, offensive tool against vulnerable servers. Technologies: Python, Metasploit API, MongoDB.☆21Updated 8 years ago
- Protect your parents from phishing☆39Updated 6 years ago
- Remote Windows shell☆30Updated 10 years ago
- Based on the Volatility framework, this script will run various plugins as well as create a timeline, or use YARA/ClamAV/VirusTotal to fi…☆49Updated 7 years ago
- pwning & info gathering via user browser☆39Updated 9 years ago