karthikuj / 7uringLinks
An advanced cryptography tool for hashing, encrypting, encoding, steganography and more.
☆17Updated 3 years ago
Alternatives and similar repositories for 7uring
Users that are interested in 7uring are comparing it to the libraries listed below
Sorting:
- ☆16Updated 3 years ago
- Association of Computer Enthusiasts brings you with ACECTF. Test your hacking skills in our thrilling 24-hour cybersecurity challenge. Le…☆14Updated 3 months ago
- Keylogger for Linux made in Python☆6Updated 2 years ago
- An Open Source Mobile Forensics Investigation Tool for Android Platform☆165Updated 2 years ago
- Hard-to-detect image steganography☆40Updated 4 months ago
- Solutions for the HackThisSite Missions☆16Updated 7 years ago
- Used to do complete Steganography analysis of an image. This tool will help the user to detect any hidden text or message in the image an…☆10Updated 6 years ago
- A python tool for sms bombing only Robi and Airtel numbers.☆8Updated 4 months ago
- Mutant is an open-source, garbage-collected programming language that tries to enable security by default.☆54Updated 9 months ago
- An forensics tool to help aid in the investigation of spoofed emails based off the email headers.☆169Updated 4 years ago
- Website that lets you:- • Generate strong new passwords • Check the strength of your password and • Find the time it would take a hacker …☆11Updated 3 years ago
- Exposing phishing kits seen from phishunt.io☆245Updated 2 weeks ago
- ✨Encoding text messages✍🏻 within images🖼 and videos📽✨☆16Updated 4 years ago
- capNcook - a dark web exploration tool☆102Updated 8 months ago
- Implementation of LSB Steganography technique in Python 3. It also includes a GUI implementation.☆14Updated 5 years ago
- An offline Phishing Email Analyzer. Enabling non-techies to analyze phishing emails automatically!☆63Updated last year
- Steganography in Twitter using retweets☆11Updated 3 years ago
- Linked Pixel Steganography (LPS) technique is a variant of the well-known LSB steganography. It can be applied to any type of images.☆18Updated 2 years ago
- Automating the boring stego work for you..☆15Updated 6 years ago
- ☆11Updated 4 years ago
- WhatMail is a command-line tool that analyzes the header of an email and provides detailed information about various fields.☆136Updated last year
- List of groups that are carrying out cyber actions in the conflict between Israel and Palestine.☆28Updated last year
- Things we learned from Capture The Flag hacking competitions we participated in☆21Updated 4 years ago
- Signal database acquisition and decryption.☆28Updated 2 years ago
- A list of covert channels and steganography/steganalysis resources (books, papers & tools)☆102Updated 2 years ago
- Video Steganography for Piracy Prevention☆12Updated 8 years ago
- ☆11Updated last month
- Major tools used for Digital Forensic Investigation, includes tools used for Image, Audio, Memory, Network and Disk Image data analysis. …☆83Updated 4 years ago
- ☆48Updated last year
- A tool that detects maliciousness of suspicious links, written in python with <3.☆15Updated 2 years ago