kaushalmeena / digi-cloakView external linksLinks
A web app that hides secrets in plain sight securely in images with the help of AES encryption and LSB steganography technique.
☆79Oct 8, 2025Updated 4 months ago
Alternatives and similar repositories for digi-cloak
Users that are interested in digi-cloak are comparing it to the libraries listed below
Sorting:
- Etwti-UnhookPOC just for test☆12Aug 23, 2022Updated 3 years ago
- An In-memory Embedding of CPython☆31May 24, 2021Updated 4 years ago
- Microsoft365 Device Code Phishing Framework☆39Sep 4, 2021Updated 4 years ago
- A small example of loading BOFs in Python with pure reflection☆19Jan 26, 2023Updated 3 years ago
- Simple reverse ICMP shell☆14Apr 30, 2024Updated last year
- A simple PE loader.☆27Dec 9, 2022Updated 3 years ago
- Docker projects to retain beacon source IPs using C2 relaying infra☆11Feb 25, 2019Updated 6 years ago
- my ethereum RPC node setup & notes☆12Dec 16, 2025Updated 2 months ago
- A collection of scripts used to support an OffSecOps pipeline.☆14Jan 31, 2021Updated 5 years ago
- ☆12Apr 7, 2022Updated 3 years ago
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆11Nov 24, 2023Updated 2 years ago
- Compare Bloxroute and Fiber transaction streams☆10Nov 22, 2024Updated last year
- A custom SentinelOne USB scanner.☆18Mar 26, 2022Updated 3 years ago
- Tools for taking over Crestron Windows CE devices☆36Jul 11, 2022Updated 3 years ago
- Event Data Collector☆40Jan 12, 2026Updated last month
- A simple reverse ssh/proxy implant PoC for *nix systems.☆57Jul 5, 2024Updated last year
- A pure-std Rust computation graph library☆15Jun 3, 2021Updated 4 years ago
- A Practical example of ELAM (Early Launch Anti-Malware)☆36Nov 12, 2021Updated 4 years ago
- A collection of sample code used in some experiments with Sliver C2☆16Mar 28, 2023Updated 2 years ago
- A Python script to extract the list of users of a GiTea instance, unauthenticated or authenticated.☆15Feb 11, 2025Updated last year
- ☆14Sep 29, 2023Updated 2 years ago
- Standalone Cobalt Strike operation logging Aggressor script for Ghostwriter 2.0+☆36Dec 1, 2025Updated 2 months ago
- ☆23Aug 1, 2021Updated 4 years ago
- various methods of making API calls☆19Feb 1, 2025Updated last year
- ERC-4626 compatible CryptoSwap pool☆18Jul 25, 2022Updated 3 years ago
- Example of using Sleep to create better named pipes.☆41Jul 25, 2023Updated 2 years ago
- EVM Opcodes, Assembler, and Disassembler☆23Dec 16, 2022Updated 3 years ago
- Use the EVM cache state to shim transient storage☆20Feb 9, 2023Updated 3 years ago
- Semgrep rules for Cairo 1.0☆18Aug 28, 2023Updated 2 years ago
- Beacon Object Files used for Cobalt Strike☆19Jul 18, 2023Updated 2 years ago
- PoC for detecting and evading ETW detection of .Net Assembly.Load☆21Aug 26, 2020Updated 5 years ago
- An efficient constant gas function dispatch pattern for solidity external libraries.☆15Sep 1, 2023Updated 2 years ago
- A .NET 4.8 application to retrieve delivr.to emails from Microsoft Outlook via COM☆20Jul 19, 2025Updated 6 months ago
- Beating OpenZeppelin's Ethernaut in Pure Assembly. Masochists Only.☆24May 9, 2023Updated 2 years ago
- A runtime for developing large-scale and complex shellcode.☆22Updated this week
- Rust crate to simplify Windows ACL operations☆19Jun 9, 2023Updated 2 years ago
- just manipulatin these here tokens yes sir nothing weird☆22Apr 18, 2022Updated 3 years ago
- ☆20Apr 21, 2020Updated 5 years ago
- A simple Nim stager (w/ fiber execution)☆20Jan 31, 2022Updated 4 years ago