omriher / LSB_SteganographyLinks
A basic example of how to use Least Significant Bit steganography on a BMP image
☆15Updated 2 years ago
Alternatives and similar repositories for LSB_Steganography
Users that are interested in LSB_Steganography are comparing it to the libraries listed below
Sorting:
- Local privilege escalation scripts and tools☆16Updated 8 years ago
- Educational Python penetration testing framework☆9Updated 7 years ago
- CVE-2014-0160 (Heartbeat Buffer over-read bug)☆16Updated 11 years ago
- Transmissions over time based covert channels across a network. Modifies the time intervals between packets to transmit data.☆22Updated 3 years ago
- Canari local transforms pcap file analysis☆31Updated 11 years ago
- ☆15Updated 11 years ago
- python client/server keystroke logger☆21Updated 12 years ago
- A better SSL cipher checker using gnutls☆28Updated 8 years ago
- Some helper tools for network pentest☆19Updated 11 years ago
- Various pentest scripts☆13Updated 11 years ago
- Proof-of-concept implementation of the Apple relay attack in Python☆30Updated 10 years ago
- Registry Based Artifact Collection and Correlation☆10Updated 9 years ago
- Searches for interesting cached DNS entries.☆55Updated 11 years ago
- Inf0rm3r - A Linux Info & Ssytem Enumeration Script☆13Updated 11 years ago
- ☆17Updated 10 years ago
- USB Attack to Decrypt Wi-Fi Communications☆32Updated 9 years ago
- Simple python script to detect meterpreter running in memory (hopefully)☆9Updated 10 years ago
- Botnet monitoring is a crucial part in threat analysis and often neglected due to the lack of proper open source tools. Our tool will pro…☆81Updated 12 years ago
- SlyPI☆19Updated 12 years ago
- Extract useful information from a Twitter account.☆34Updated 11 years ago
- µphisher spear phishing tool (reference implementation)☆40Updated 5 years ago
- Holepuncher, A wrapper script to open ports in iptables and start a listener.☆32Updated 9 years ago
- It is the Distributed Version of Thug, by which all systems across the world running thug will get connect. Then URLs will be distributed…☆24Updated 9 years ago
- A PoC botnet that uses image files distributed via Twitter for a command and control channel.☆19Updated 13 years ago
- Data exfiltration PoC scripts☆24Updated 9 years ago
- python web scraping☆9Updated 10 years ago
- Pastenum is a text dump enumeration tool.☆14Updated 11 years ago
- Universal stack-based buffer overfow exploitation tool☆23Updated 11 years ago
- Protect your parents from phishing☆39Updated 7 years ago
- Automates sslstrip arp spoofing MITM attack. FOR TESTING PURPOSES ONLY.☆37Updated 9 years ago