jakekarnes42 / steg
An exploration into Steganography with Python
☆13Updated 7 years ago
Related projects: ⓘ
- Hide any file in a PNG Image☆20Updated 7 years ago
- A reverse way of music look up by downloading full albums from online music sources☆46Updated 8 years ago
- Twitter as an extra entropy source☆98Updated 6 years ago
- A steganographic program that encodes files in pictures☆106Updated 5 years ago
- Store arbitrary files inside PNGs to overcome nonsensical file type restrictions☆30Updated 7 years ago
- ☆32Updated this week
- A YouTube powered music player with instant search and playlist capabilities.☆36Updated 3 years ago
- Steganography in Twitter using retweets☆11Updated 2 years ago
- A collection of steganography tools.☆14Updated 3 years ago
- Application for cracking Red Petya key based on genetic algorithms.☆52Updated 2 years ago
- SteCoSteg is OutGuess successor and Vernam cipher analog in steganography.☆55Updated 5 years ago
- Recover access to all logged in accounts and passwords for Google Chrome in just a few clicks!☆29Updated 10 years ago
- A collection of Hack The Planet's zines.☆71Updated 8 years ago
- irc bot to scan & bruteforce ssh/telnet☆6Updated 5 years ago
- A simple cryptosystem that provides provable plausibly deniable encryption.☆87Updated 5 years ago
- IoT device indexer and search engine.☆59Updated 5 years ago
- A list of your various social statii.☆35Updated 6 years ago
- An open source encryption program that uses the "one-time pad" method.☆32Updated 3 years ago
- An image steganography with high embedding capacity based on a genetic algorithm☆11Updated 4 years ago
- Scrape media right from your terminal with the help of Offliberty.☆27Updated 7 years ago
- Text steganography based on Markov chains☆32Updated 10 years ago
- irc bot with many useful commands☆12Updated 5 years ago
- Create Tor hidden services in Python.☆50Updated last year
- A simple Tor enabled, multi-process SSH dictionary attack in Python3.☆18Updated 6 years ago
- a collection of public domain artwork and graphics, where possible, with source files to help others remix and reuse to make slides, hand…☆30Updated 6 years ago
- A Linux shell script to improve your privacy online☆83Updated 8 years ago
- An example chrome extension to demonstrate the dangers of injecting javascript and html into a page☆35Updated 7 years ago
- Proof-of-concept python IRC botnet for orchestrating macOS computers (harmless due to SIP & Gatekeeper)☆83Updated 3 years ago
- NSA Product Generator!☆43Updated 8 years ago
- usbWatchdog - monitor changes to your usb ports, and if anything is plugged in or removed, wipe RAM and shut down.☆49Updated 7 years ago