omriher / LSB_SteganographyLinks
A basic example of how to use Least Significant Bit steganography on a BMP image
☆15Updated 2 years ago
Alternatives and similar repositories for LSB_Steganography
Users that are interested in LSB_Steganography are comparing it to the libraries listed below
Sorting:
- python client/server keystroke logger☆23Updated 13 years ago
- Botnet monitoring is a crucial part in threat analysis and often neglected due to the lack of proper open source tools. Our tool will pro…☆81Updated 12 years ago
- Wireless Attacks in Python (Based on Blog Series)☆93Updated 11 years ago
- USB Attack to Decrypt Wi-Fi Communications☆32Updated 10 years ago
- Offline Digital Forensics Tool for Binary Files☆38Updated 7 years ago
- A python based dropper, that uses steganography and an image over http to transfer a file☆59Updated 10 years ago
- A client/server style agent meant for testing connectivity to and from a machine on a network.☆20Updated 8 years ago
- Data exfiltration using covert channels in the TCP/IP protocol with some basic steganography.☆13Updated 8 years ago
- ☆17Updated 8 years ago
- hemingway is a simple and easy to use spear phishing helper.☆42Updated 8 years ago
- µphisher spear phishing tool (reference implementation)☆40Updated 5 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Updated 9 years ago
- Tools for check NSA EGBL exploit against Fortinet Firewall☆32Updated 9 years ago
- A network data locater using credentials obtained during penetration tests☆32Updated 12 years ago
- scripts to create zip bombs☆12Updated 12 years ago
- Prints the IPs on your local network that're sending the most packets☆151Updated 4 years ago
- Download all malicious files from a Kippo SSH honeypot database☆23Updated 11 years ago
- A modular framework and program for synchronous pwning with ssh, powered by Python 3, for educational and controlled penetration testing…☆10Updated 9 years ago
- Local privilege escalation scripts and tools☆17Updated 9 years ago
- Public Advisories for Security Vulnerabilities.☆25Updated 10 years ago
- Scanning, offensive tool against vulnerable servers. Technologies: Python, Metasploit API, MongoDB.☆22Updated 9 years ago
- ☆15Updated 11 years ago
- Simple script to automated the capture and merging process when using a hardware TAP☆15Updated 12 years ago
- This script will try to find a domains subdomains by using google dorking. It will never connect to the site it is researching.☆20Updated 9 years ago
- Hasher is designed to be a tool that allows you to quickly hash plaintext strings, or compare hashed values with a plaintext locally. Not…☆52Updated 3 years ago
- `wash` is a framework for creating and interfacing with trojans that can establish a "web shell" on a compromised web server. It is desig…☆29Updated 8 years ago
- Various pentest scripts☆14Updated 11 years ago
- Inf0rm3r - A Linux Info & Ssytem Enumeration Script☆13Updated 12 years ago
- A python script for obfuscating wireless networks☆79Updated 8 years ago
- Harvest FTP/POP/IMAP/HTTP/IRC creds☆168Updated 10 years ago