omriher / LSB_SteganographyLinks
A basic example of how to use Least Significant Bit steganography on a BMP image
☆15Updated 2 years ago
Alternatives and similar repositories for LSB_Steganography
Users that are interested in LSB_Steganography are comparing it to the libraries listed below
Sorting:
- python client/server keystroke logger☆21Updated 12 years ago
- scripts to create zip bombs☆12Updated 12 years ago
- Tools for check NSA EGBL exploit against Fortinet Firewall☆32Updated 8 years ago
- Data exfiltration using covert channels in the TCP/IP protocol with some basic steganography.☆13Updated 8 years ago
- Botnet monitoring is a crucial part in threat analysis and often neglected due to the lack of proper open source tools. Our tool will pro…☆81Updated 12 years ago
- Wireless discovery and exploitation framework written in Python☆18Updated 14 years ago
- Various pentest scripts☆14Updated 11 years ago
- Telegram Bot to manage botnets created with struts vulnerability(CVE-2017-5638)☆42Updated 3 years ago
- A Simple network sniffer implemented on Python 3☆73Updated 5 years ago
- A simple tool to dump users in popular forums and CMS :)☆29Updated 7 years ago
- A modular framework and program for synchronous pwning with ssh, powered by Python 3, for educational and controlled penetration testing…☆10Updated 8 years ago
- Automates sslstrip arp spoofing MITM attack. FOR TESTING PURPOSES ONLY.☆37Updated 9 years ago
- CVE-2014-0160 (Heartbeat Buffer over-read bug)☆16Updated 11 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆39Updated 9 years ago
- A Network Inspection Tool☆81Updated 7 years ago
- Some exploits for ZeroNights 0x03☆36Updated 10 years ago
- Local privilege escalation scripts and tools☆17Updated 8 years ago
- A python based dropper, that uses steganography and an image over http to transfer a file☆58Updated 9 years ago
- µphisher spear phishing tool (reference implementation)☆40Updated 5 years ago
- A network data locater using credentials obtained during penetration tests☆32Updated 11 years ago
- ☆15Updated 11 years ago
- Wireless Reconnaissance And Intelligent Target Harvesting☆49Updated 9 years ago
- hemingway is a simple and easy to use spear phishing helper.☆42Updated 8 years ago
- A client/server style agent meant for testing connectivity to and from a machine on a network.☆20Updated 7 years ago
- A python script for obfuscating wireless networks☆78Updated 8 years ago
- Dorker, programa utilizado para automatizar pesquisas em buscadores, faz uso de alguns filtros.☆16Updated 9 years ago
- Offline Digital Forensics Tool for Binary Files☆38Updated 7 years ago
- find and detect Malicious TOR Relays☆14Updated 9 years ago
- NSA EquationGroup C&C Hunter using the Shodan API☆29Updated 10 years ago
- Proof-of-concept implementation of the Apple relay attack in Python☆30Updated 10 years ago