omriher / LSB_Steganography
A basic example of how to use Least Significant Bit steganography on a BMP image
☆15Updated last year
Alternatives and similar repositories for LSB_Steganography:
Users that are interested in LSB_Steganography are comparing it to the libraries listed below
- python client/server keystroke logger☆21Updated 12 years ago
- Data exfiltration using covert channels in the TCP/IP protocol with some basic steganography.☆13Updated 7 years ago
- Educational Python penetration testing framework☆10Updated 7 years ago
- Registry Based Artifact Collection and Correlation☆10Updated 9 years ago
- Download all malicious files from a Kippo SSH honeypot database☆23Updated 10 years ago
- Brisket is a collection of frontend scripts for masscan, zmap, and nmap, in addition data manipulation scripts☆29Updated 10 years ago
- A client/server style agent meant for testing connectivity to and from a machine on a network.☆20Updated 7 years ago
- A short and small memory forensics helper.☆52Updated 7 years ago
- Canari local transforms pcap file analysis☆31Updated 10 years ago
- A python based dropper, that uses steganography and an image over http to transfer a file☆58Updated 9 years ago
- A Simple network sniffer implemented on Python 3☆73Updated 4 years ago
- Clone of Metasploit's wiki w/ additions☆15Updated 9 years ago
- Offline Digital Forensics Tool for Binary Files☆38Updated 7 years ago
- Indicator of Compromise Mapping Service☆12Updated 10 years ago
- scripts to create zip bombs☆12Updated 12 years ago
- ☆17Updated 7 years ago
- Honeypot for router backdoor (TCP 32764)☆18Updated 11 years ago
- Based on the Volatility framework, this script will run various plugins as well as create a timeline, or use YARA/ClamAV/VirusTotal to fi…☆49Updated 7 years ago
- A modular framework and program for synchronous pwning with ssh, powered by Python 3, for educational and controlled penetration testing…☆10Updated 8 years ago
- Simple web app for displaying cowrie data in your browser☆12Updated 8 years ago
- A website outlining my bounty hunt game.☆11Updated 5 years ago
- Cryptowall Tooling & Information☆34Updated 8 years ago
- Automating LFI/RFI using Burp Proxy Logs and fimap☆13Updated 12 years ago
- Intelligent threat hunter and phishing servers☆47Updated 6 years ago
- Quick & dirty script to get info on a file from online resources (VirusTotal, Team Cymru, Shadow Server etc.)☆30Updated 10 years ago
- Botnet monitoring is a crucial part in threat analysis and often neglected due to the lack of proper open source tools. Our tool will pro…☆81Updated 11 years ago
- PoC exploit code for CVE-2015-5477 BIND9 TKEY remote DoS vulnerability☆14Updated 9 years ago
- ANWI - All New Wireless IDS☆27Updated 5 years ago
- (Unofficial) Python API for http://ransomwaretracker.abuse.ch/tracker/☆16Updated 7 years ago
- A Volatility plugin for finding sqlite database rows☆22Updated 5 years ago