Audio steganography web app
☆18Apr 13, 2026Updated 3 weeks ago
Alternatives and similar repositories for stegonaut
Users that are interested in stegonaut are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Source code for the book "Black Hat Python" by Justin Seitz. The code has been fully converted to Python 3, reformatted to comply with PE…☆11May 19, 2020Updated 5 years ago
- xorhunx adalah tool cryptography☆14Jun 21, 2023Updated 2 years ago
- Ultra fast hashcracking tool written in Python3☆12Mar 28, 2021Updated 5 years ago
- Documentation and a model font released under the SIL Open Font License 1.1 to support revitalization and development of indigenous langu…☆38Apr 8, 2026Updated last month
- Bug Hunting Penetration RGB Hat are red, gray, and black hat☆19Jan 21, 2026Updated 3 months ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Techniques that i have used to evade anti-virus during pen tests.☆13May 29, 2018Updated 7 years ago
- ☆11Mar 19, 2019Updated 7 years ago
- Two C# RunPE's capable of x86 and x64 injections☆11Dec 2, 2018Updated 7 years ago
- XOrCryptEx lightweight C Utility/Algorithm☆13Mar 3, 2022Updated 4 years ago
- Windbg2ida lets you dump each step in Windbg then shows these steps in IDA☆77Jul 6, 2024Updated last year
- CVE-2020-25223☆11Sep 13, 2021Updated 4 years ago
- Simple Golang JWT Bruteforcer 2☆10May 25, 2021Updated 4 years ago
- NativePayload_TiACBT (Remote Thread Injection + C# Async Method + CallBack Functions Technique)☆13Jun 6, 2023Updated 2 years ago
- Work files for my blog post "Code Caving in a PE file.☆16Dec 18, 2016Updated 9 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆20Sep 22, 2021Updated 4 years ago
- Make your Ghidra Lazy!☆157Aug 27, 2020Updated 5 years ago
- ESP8266 ROM Bootloader utility☆12Jun 28, 2020Updated 5 years ago
- Tartocitron is a repo to have fun with malwares and the Rust language. This repo provides working examples of dropper written in Rust.☆11May 31, 2022Updated 3 years ago
- 📡 Ease file sharing during pentest/CTF 🎸☆11Apr 20, 2026Updated 2 weeks ago
- Python utility to export a user's starred repositories list into a CSV file☆17May 3, 2018Updated 8 years ago
- Vuln-dev environment for LuaJIT☆20Dec 30, 2022Updated 3 years ago
- A Docker container used to easily compile Nim binaries generated by my tools (NimPackt and NimPlant)☆16Aug 31, 2023Updated 2 years ago
- ☆20Feb 22, 2021Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Abusing Remote Windows SMB Shares for Fun and Pen Testing☆15May 23, 2023Updated 2 years ago
- Collection of scripts that I created to make my life easier.☆12May 10, 2021Updated 4 years ago
- [Deprecated] Painless code injection☆52Oct 8, 2014Updated 11 years ago
- AI Powered Sensitive Information Detection☆20Mar 13, 2024Updated 2 years ago
- Prototype program to decode a video file looking for exploits/malware.☆17Jul 26, 2020Updated 5 years ago
- Collection of things made during my SLAE 32-bit journey☆14Feb 24, 2022Updated 4 years ago
- A Golang tool to whitelist ASN's based on organization name☆15Mar 7, 2022Updated 4 years ago
- Angecryption PoC☆12Mar 27, 2014Updated 12 years ago
- WordPress Backup Guard Authenticated Remote Code Execution Exploit☆10Jul 30, 2021Updated 4 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- experimenting w/ apple script for various macOS functionality☆14Aug 4, 2019Updated 6 years ago
- This script was developped to assist in SpearPhishing campaign during Red Team operations. It can be used to generate random name based o…☆13Feb 6, 2023Updated 3 years ago
- Metasploit Post-Exploitation Gather module for Exchange Server☆26Mar 26, 2021Updated 5 years ago
- A Go package for encoding and decoding video and audio files.☆15Jul 7, 2021Updated 4 years ago
- Moved to HappyHackingSpace/pirebok☆14Feb 11, 2026Updated 2 months ago
- NSA Codebreaker Challenge 2019 write-ups.☆21Jan 4, 2020Updated 6 years ago
- Experimenting with destructive file attacks in Go☆18May 20, 2019Updated 6 years ago