omriher / LSB_Steganography
A basic example of how to use Least Significant Bit steganography on a BMP image
☆15Updated last year
Related projects: ⓘ
- python client/server keystroke logger☆21Updated 11 years ago
- Various pentest scripts☆14Updated 10 years ago
- This device silently hunts its prey, swooping in to gather RFID cards.☆31Updated 2 years ago
- Data exfiltration using covert channels in the TCP/IP protocol with some basic steganography.☆13Updated 7 years ago
- A duckyscript compatible Pi-Zero project, which utilises nmap - in particular the OS Detection features - to trigger OS-specific payloads…☆17Updated 7 years ago
- Local privilege escalation scripts and tools☆16Updated 8 years ago
- Canari local transforms pcap file analysis☆29Updated 10 years ago
- all scripts created/mentioned in blog mh4x0f☆7Updated 6 years ago
- ☆12Updated this week
- Download exploits from exploit-db.com☆43Updated 9 years ago
- Reference implementation and job creation tool for cracking DES using the crack.sh service☆22Updated 7 years ago
- Automating LFI/RFI using Burp Proxy Logs and fimap☆13Updated 12 years ago
- Clone of Metasploit's wiki w/ additions☆15Updated 8 years ago
- Universal stack-based buffer overfow exploitation tool☆22Updated 10 years ago
- ☆10Updated this week
- ☆51Updated this week
- Tools for check NSA EGBL exploit against Fortinet Firewall☆31Updated 8 years ago
- ☆23Updated this week
- Registry Based Artifact Collection and Correlation☆10Updated 9 years ago
- scripts to create zip bombs☆11Updated 11 years ago
- NSA EquationGroup C&C Hunter using the Shodan API☆28Updated 9 years ago
- ☆13Updated this week
- ☆15Updated 7 years ago
- ☆12Updated this week
- A Simple network sniffer implemented on Python 3☆71Updated 4 years ago
- NMAP Patches and NSE Scripts☆19Updated 11 years ago
- Public Advisories for Security Vulnerabilities.☆26Updated 9 years ago
- ☆17Updated this week
- find and detect Malicious TOR Relays☆14Updated 8 years ago