omriher / LSB_SteganographyLinks
A basic example of how to use Least Significant Bit steganography on a BMP image
☆15Updated 2 years ago
Alternatives and similar repositories for LSB_Steganography
Users that are interested in LSB_Steganography are comparing it to the libraries listed below
Sorting:
- python client/server keystroke logger☆21Updated 12 years ago
- Botnet monitoring is a crucial part in threat analysis and often neglected due to the lack of proper open source tools. Our tool will pro…☆81Updated 12 years ago
- Data exfiltration using covert channels in the TCP/IP protocol with some basic steganography.☆13Updated 8 years ago
- A Simple network sniffer implemented on Python 3☆73Updated 5 years ago
- µphisher spear phishing tool (reference implementation)☆40Updated 5 years ago
- Automates sslstrip arp spoofing MITM attack. FOR TESTING PURPOSES ONLY.☆37Updated 9 years ago
- A modular framework and program for synchronous pwning with ssh, powered by Python 3, for educational and controlled penetration testing…☆10Updated 8 years ago
- Local privilege escalation scripts and tools☆17Updated 9 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆39Updated 9 years ago
- A client/server style agent meant for testing connectivity to and from a machine on a network.☆20Updated 7 years ago
- Download exploits from exploit-db.com☆43Updated 10 years ago
- A simple tool to dump users in popular forums and CMS :)☆30Updated 7 years ago
- Wireless Reconnaissance And Intelligent Target Harvesting☆49Updated 9 years ago
- Various pentest scripts☆14Updated 11 years ago
- Scanning, offensive tool against vulnerable servers. Technologies: Python, Metasploit API, MongoDB.☆22Updated 9 years ago
- A script to generate wordlists out of wikipedia pages. Should support most of the subdomains. Some ugly code may occur☆31Updated 10 years ago
- Suru is one of the original Man In The Middle (MITM) proxies that sits between the user's browser and the web application.☆28Updated 8 years ago
- Tools for check NSA EGBL exploit against Fortinet Firewall☆32Updated 8 years ago
- Transmissions over time based covert channels across a network. Modifies the time intervals between packets to transmit data.☆22Updated 3 years ago
- ☆15Updated 11 years ago
- hemingway is a simple and easy to use spear phishing helper.☆42Updated 8 years ago
- Proof-of-concept implementation of the Apple relay attack in Python☆30Updated 10 years ago
- scripts to create zip bombs☆12Updated 12 years ago
- The third open source piece of ransomware using bash☆15Updated 9 years ago
- CVE-2014-0160 (Heartbeat Buffer over-read bug)☆16Updated 11 years ago
- Automated man-in-the-middle attack tool.☆51Updated 10 years ago
- USB Attack to Decrypt Wi-Fi Communications☆32Updated 10 years ago
- Simple web app for displaying cowrie data in your browser☆12Updated 9 years ago
- A network data locater using credentials obtained during penetration tests☆32Updated 11 years ago
- Public Advisories for Security Vulnerabilities.☆24Updated 10 years ago