jzck / horqrux
QR code splitting
☆133Updated last year
Related projects: ⓘ
- Light-weight web security scanner☆148Updated last year
- Modern web-based distributed hashcracking solution, built on hashcat☆109Updated this week
- Friendly graphical output of the nmap tool that allows filtering by open ports☆136Updated 2 years ago
- A web service to clean documents from potentially privacy-invasive metadata☆51Updated 6 months ago
- File Hider is a sophisticated tool that allows you to securely hide and encrypt a file within another file using multiple layers of AES-2…☆109Updated 8 months ago
- The Telegram Snowball Sampling Tool is a Python-based utility designed for conducting snowball sampling to collect Telegram channels thro…☆89Updated 7 months ago
- Keylogging server and client that uses DNS tunneling/exfiltration to transmit keystrokes through firewalls.☆218Updated 3 months ago
- ☆75Updated this week
- This tool is a command line utility that allows you to convert any binary file into a QRcode movie. The data can then be reassembled visu…☆259Updated last year
- Payload for jpg file☆57Updated last month
- OSINT analysis tools of a Telegram bot☆190Updated 6 months ago
- If you want know, who use your computer when you are not nearby!☆47Updated 2 years ago
- blurs faces in video☆70Updated 3 weeks ago
- ☆253Updated last year
- A bash script for performing advanced Google dork searches to find files, names, usernames, emails, phone numbers, and images.☆23Updated 3 months ago
- Web-based virtual machine manager - BSc. Computer Systems dissertation project (Heriot-Watt University)☆75Updated this week
- Mainly YouTube, tools, techniques & tradecraft OSINT resources.☆76Updated 2 months ago
- SSH Reverse Tunnels with Login Notifications via Telegram Bot☆28Updated last year
- ☆48Updated 9 months ago
- This tool downloads each page from the Wayback Machine for a specific domain and enables further keyword search on each saved page.☆158Updated 4 months ago
- PixelGuard protects images from AI scraping and unauthorized use in AI training, such as facial recognition models or style transfer algo…☆46Updated last month
- qrcode password protected☆57Updated 9 months ago
- 🕸️ Crawl in the web network☆348Updated 4 months ago
- 🧸 fully isolated honeypot ssh server using thrussh☆219Updated 7 months ago
- A monster cheatsheet on MITM attacks☆311Updated 7 months ago
- ☆89Updated last week
- Tool to prevent eavesdropping and ultrasonic access of your smart phone.☆111Updated 2 weeks ago
- Gather information about a Duolingo user☆68Updated last year
- ☆88Updated 9 months ago
- Automated Hardening Framework for Ubuntu☆108Updated 5 months ago