omriher / LSB_SteganographyLinks
A basic example of how to use Least Significant Bit steganography on a BMP image
☆15Updated 2 years ago
Alternatives and similar repositories for LSB_Steganography
Users that are interested in LSB_Steganography are comparing it to the libraries listed below
Sorting:
- Data exfiltration using covert channels in the TCP/IP protocol with some basic steganography.☆13Updated 8 years ago
- python client/server keystroke logger☆23Updated 13 years ago
- scripts to create zip bombs☆12Updated 13 years ago
- Botnet monitoring is a crucial part in threat analysis and often neglected due to the lack of proper open source tools. Our tool will pro…☆81Updated 12 years ago
- USB Attack to Decrypt Wi-Fi Communications☆32Updated 10 years ago
- Download exploits from exploit-db.com☆46Updated 10 years ago
- Wireless Reconnaissance And Intelligent Target Harvesting☆49Updated 9 years ago
- A duckyscript compatible Pi-Zero project, which utilises nmap - in particular the OS Detection features - to trigger OS-specific payloads…☆16Updated 9 years ago
- A Simple network sniffer implemented on Python 3☆75Updated 5 years ago
- µphisher spear phishing tool (reference implementation)☆40Updated 5 years ago
- Automates sslstrip arp spoofing MITM attack. FOR TESTING PURPOSES ONLY.☆37Updated 9 years ago
- Tools for check NSA EGBL exploit against Fortinet Firewall☆32Updated 9 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Updated 9 years ago
- XMLRPC server for password cracking☆33Updated 10 years ago
- hemingway is a simple and easy to use spear phishing helper.☆42Updated 9 years ago
- An unordered collection of various personnal scripts☆16Updated 15 years ago
- Public Advisories for Security Vulnerabilities.☆25Updated 10 years ago
- Inf0rm3r - A Linux Info & Ssytem Enumeration Script☆13Updated 12 years ago
- A python script for obfuscating wireless networks☆79Updated 9 years ago
- IRON-HID: Create Your Own Bad USB Device (Presented at HITBSecConf 2016)☆62Updated 7 years ago
- Discover potential timestamps within the Windows Registry☆19Updated 11 years ago
- Scanning, offensive tool against vulnerable servers. Technologies: Python, Metasploit API, MongoDB.☆22Updated 9 years ago
- PoC exploit code for CVE-2015-5477 BIND9 TKEY remote DoS vulnerability☆14Updated 10 years ago
- Local privilege escalation scripts and tools☆17Updated 9 years ago
- my little bucket to store the delusions of grandeur I write in python :D☆30Updated 11 years ago
- Use security tools from within IRC.☆24Updated 13 years ago
- A modular framework and program for synchronous pwning with ssh, powered by Python 3, for educational and controlled penetration testing…☆10Updated 9 years ago
- A script to generate wordlists out of wikipedia pages. Should support most of the subdomains. Some ugly code may occur☆31Updated 11 years ago
- !!! Deprecated See ESPloitV2 !!! Original PoC(Released: Sep 11, 2016) - WiFi controlled keystroke injection Using ESP8266 and 32u4 based…☆49Updated 8 years ago
- Offline Digital Forensics Tool for Binary Files☆38Updated 8 years ago