jokLiu / ImageSteganographyView external linksLinks
Static C++ image steganography library.
☆11Jan 2, 2018Updated 8 years ago
Alternatives and similar repositories for ImageSteganography
Users that are interested in ImageSteganography are comparing it to the libraries listed below
Sorting:
- ☆25Sep 27, 2023Updated 2 years ago
- quASAR: ASAR manipulation made easy☆38Sep 7, 2022Updated 3 years ago
- Giga-byte Control Center (GCC) is a software package designed for improved user experience of Gigabyte hardware, often found in gaming an…☆33Feb 2, 2026Updated last week
- Electron-Probe leverages the Node variant of the Chrome Debugging Protocol to execute JavaScript payloads inside of target Electron appli…☆31Jan 13, 2026Updated last month
- Shellcode Loader Engine for Windows☆27Jan 29, 2017Updated 9 years ago
- CVE-2024-43451 is a Windows NTLM vulnerability that allows an attacker to force authentication and capture NTLM hashes by using malicious…☆15Jan 21, 2025Updated last year
- ☆10Aug 26, 2016Updated 9 years ago
- A powerful Rust SDK for real-time listening and parsing Fourmeme contract events on BSC, with automatic tracking of token lifecycle from …☆52Oct 9, 2025Updated 4 months ago
- An simplest PE parser, which list all import and export entries☆12Oct 11, 2018Updated 7 years ago
- Venom aes流量加密☆37Apr 15, 2023Updated 2 years ago
- CSharp Writeups for HackSys Extreme Vulnerable Driver☆45Dec 22, 2021Updated 4 years ago
- Hyper-V Fuzzer using hAFL2☆11May 10, 2022Updated 3 years ago
- Verify and decrypt .NET's .ASPXAUTH cookie from node.☆11Jul 18, 2023Updated 2 years ago
- GET-ACQ is a python tool used to gather all companies acquired by a given company domain name. It is done by calling SecurityTrails API.☆12Nov 10, 2021Updated 4 years ago
- A fork of https://github.com/SafeBreach-Labs/pinjectra with a practical implementation of Stack Bombing☆29Oct 22, 2020Updated 5 years ago
- CVE-2025-62215 is an Elevation of Privilege (EoP) vulnerability in the Windows Kernel, disclosed in November 2025 and confirmed to be act…☆26Nov 14, 2025Updated 3 months ago
- CEF3 notes☆11Feb 26, 2018Updated 7 years ago
- Collection Of Terrible CNC/Qbot Panels☆11Aug 8, 2025Updated 6 months ago
- Offensive tool for guessing Active Directory credentials via Kerberos☆10Jan 1, 2024Updated 2 years ago
- ☆12Oct 9, 2022Updated 3 years ago
- DUQU MALWARE SOURCE + BINARY + More coming☆12Feb 6, 2023Updated 3 years ago
- This repo basically contains the code that was mentioned in the blogposts that was written by me at:☆99Dec 19, 2022Updated 3 years ago
- 窃取mstsc中的用户明文凭据☆47Apr 23, 2021Updated 4 years ago
- ☆11Feb 13, 2024Updated 2 years ago
- A tool is used to infected a shellcode to PE file, the shellcode is packed at compile time and unpacked at runtime☆13Jul 16, 2020Updated 5 years ago
- A signature scanner and other memory tools☆12May 8, 2021Updated 4 years ago
- MSDN data annotation for radare2☆13Jul 2, 2024Updated last year
- posting example☆15May 11, 2020Updated 5 years ago
- A shortlist of core ServiceNow tables.☆15Oct 16, 2023Updated 2 years ago
- havoc2nginx is a simple python script that converts Havoc Framework's yaotl malleable c2 profile to Nginx configuration file format. Most…☆12May 8, 2023Updated 2 years ago
- A smart card reconnaissance tool able to map out many different kinds of smart cards.☆13Oct 21, 2025Updated 3 months ago
- 最近出現在影印店的病毒,會請大家幫忙挖礦 XD☆13Jun 20, 2016Updated 9 years ago
- ☆13Dec 27, 2014Updated 11 years ago
- An issue in AVG AVG Anti-Spyware v.7.5 allows an attacker to execute arbitrary code via a crafted script to the guard.exe component☆11Aug 5, 2023Updated 2 years ago
- LSB-test☆12Jul 18, 2017Updated 8 years ago
- ☆11Jul 20, 2024Updated last year
- A script used to query the dehashed API and filter for more useful results☆17Jun 20, 2021Updated 4 years ago
- Burp Suite extension to perform Kerberos authentication☆12Jan 19, 2026Updated 3 weeks ago
- Ghidra script which fully parses COFF files☆12Oct 18, 2024Updated last year