oneplus-x / DeepSound-2.0Links
DeepSound is a steganography tool and audio converter that hides secret data into audio files.
☆53Updated 7 years ago
Alternatives and similar repositories for DeepSound-2.0
Users that are interested in DeepSound-2.0 are comparing it to the libraries listed below
Sorting:
- Official DeepSound repository migrated from jpinsoft.net. DeepSound is a freeware steganography tool and audio converter that hides secre…☆293Updated last year
- Weakpass collection of tools for bruteforce and hashcracking☆664Updated last month
- zerosum0x0's Koadic☆332Updated 4 years ago
- Mirror for rockyou.txt☆222Updated 3 years ago
- ⚡ Create infinite UAC prompts forcing a user to run as admin ⚡☆248Updated 3 years ago
- It embeds the executable file or payload inside the jpg file. The method the program uses isn't exactly called one of the steganography …☆415Updated 3 years ago
- UAC bypass for x64 Windows 7 - 11☆828Updated last week
- 7-Zip through 21.07 on Windows allows privilege escalation and command execution when a file with the .7z extension is dragged to the Hel…☆676Updated 3 years ago
- Scan/Exploit - EternalBlue MS17-010 - Windows 7 32/64 Bits☆183Updated 8 months ago
- Athena OS is a Arch/Nix-based distro focused on Cybersecurity. Learn, practice and enjoy with any hacking tool!☆1,186Updated this week
- ☆255Updated 5 years ago
- Bootkit / Windows Login Password Bypass Tool☆588Updated 9 months ago
- CVE-2023-38831 winrar exploit generator☆788Updated 2 years ago
- Python AV Evasion Tools☆521Updated 3 months ago
- Fork from @rsmudge/armitage☆140Updated 3 years ago
- Kage is Graphical User Interface for Metasploit Meterpreter and Session Handler☆1,230Updated 3 years ago
- A remote access trojan to use against Santa's laptop!☆155Updated 4 years ago
- command injection vulnerability in the web server of some Hikvision product. Due to the insufficient input validation, attacker can explo…☆291Updated 4 years ago
- Windows Defender Killer | C++ Code Disabling Permanently Windows Defender using Registry Keys☆498Updated 2 years ago
- EXOCET - AV-evading, undetectable, payload delivery tool☆844Updated 3 years ago
- Automating Host Exploitation with AI☆548Updated 3 years ago
- HVNC for Cobalt Strike☆1,294Updated 2 years ago
- A browser extension for Penetration Testing☆559Updated 2 weeks ago
- Universal steganographic tool☆320Updated 4 years ago
- Decode All Bases - Base Scheme Decoder☆584Updated 2 years ago
- PingRAT secretly passes C2 traffic through firewalls using ICMP payloads.☆449Updated 2 years ago
- The LockBit builder files☆147Updated 2 years ago
- Stop Windows Defender programmatically☆995Updated 3 years ago
- PHP 7 and safe-build Update of the popular C99 variant of PHP Shell.☆150Updated 3 years ago
- Anti Forensics Tool For Red Teamers, Used For Erasing Footprints In The Post Exploitation Phase.☆782Updated 2 years ago