priyansh-anand / steganographerView external linksLinks
Steganograpy in Python | Hide files or data in Image Files
☆173Oct 28, 2021Updated 4 years ago
Alternatives and similar repositories for steganographer
Users that are interested in steganographer are comparing it to the libraries listed below
Sorting:
- Python Script to Crack Zip Password with Dictionary attack and also use Crunch as Pipeline☆38Jun 30, 2018Updated 7 years ago
- Hack any Instagram account through bruteforce.☆10Sep 24, 2021Updated 4 years ago
- Probe_Spider is a Open Source Intelligence Tool made complete out of Python.☆27Apr 28, 2020Updated 5 years ago
- Package manager for hackers built by hackers☆36Aug 31, 2018Updated 7 years ago
- Enumerate a target Based off of Nmap Results☆76Oct 25, 2023Updated 2 years ago
- A Torrent Magnet Link Scrapper☆14Dec 4, 2019Updated 6 years ago
- Your eyes on the target - SPY☆25Jul 24, 2020Updated 5 years ago
- Brute List is an updated word list for brute-forcing the assets. This is not like a normal outdated word list. I have collected several l…☆32Aug 29, 2021Updated 4 years ago
- EXXX EVASION | Metasploit Antivirus Evasion | Fully Undetectable Payloads☆29Apr 27, 2020Updated 5 years ago
- A Linux Packet Sniffing Suite for Automated MiTM Attacks☆244Aug 14, 2024Updated last year
- Bramble is a hacking Open source suite.☆84Jan 21, 2020Updated 6 years ago
- A python script which allows you to parse GeoLocation data from your Image files stored in a dataset.It also produces output in CSV file …☆41Dec 20, 2020Updated 5 years ago
- All In One, Fast, Easy Recon Tool☆88Jun 25, 2022Updated 3 years ago
- Windows Auto Post Exploitation - For ReD Team☆15Jul 21, 2019Updated 6 years ago
- This tool is design to find admin panel of any website by using custom wordlist or default wordlist easily and allow you to find admin pa…☆166Dec 20, 2020Updated 5 years ago
- Lazymux is a huge list of Many Hacking tools and PEN-TESTING tools! NOTE: Am not Responsible of bad use of this project.☆157Mar 4, 2020Updated 5 years ago
- This is a keylogger that collects all the data and e-mail it in a set time with system information which includes device S/N and hardware…☆46Oct 25, 2025Updated 3 months ago
- Scripts for OSCE☆18Dec 28, 2018Updated 7 years ago
- Wi-Fi Exploit Tool☆51May 23, 2020Updated 5 years ago
- ☆21Dec 1, 2019Updated 6 years ago
- A simple python script to exploit vulnerable Firebase Database. If the owner of the app have set the security rules as true for both "rea…☆22Apr 22, 2024Updated last year
- DNS isteklerini veya trafiği kendi istediğiniz yere yönlendirerek hedef web sitesini manipüle etmenize yarayan bir script.☆14Jun 24, 2020Updated 5 years ago
- ☆29May 19, 2023Updated 2 years ago
- This is repo with my custom zsh completion files for pentesting tools, which do not exist in zsh and oh-my-zsh by default☆12Oct 23, 2025Updated 3 months ago
- AES Ransomware in batch☆11Jun 25, 2024Updated last year
- Automated brute-forcing attack tool.☆418Apr 2, 2021Updated 4 years ago
- Fast Steganography bruteforce tool written in Rust useful for CTF's☆246Jun 18, 2025Updated 7 months ago
- Windows shellcode encoding and encrypting tool☆20May 4, 2022Updated 3 years ago
- CRLFMap is a tool to find HTTP Splitting vulnerabilities☆25Jul 31, 2020Updated 5 years ago
- Enhance your malware detection with WAF + YARA (WAFARAY)☆108Sep 29, 2022Updated 3 years ago
- Android Hacking Framework to generate apk with backdoor, Works on both WAN and LAN☆19Jun 19, 2022Updated 3 years ago
- DNS Enumeration with Asynchronicity☆45Oct 30, 2018Updated 7 years ago
- A keylogger that sends emails with log attachment - works on all OS☆11Oct 30, 2021Updated 4 years ago
- Amazon price tracker Python app that regularly compares the price of your favourite product on Amazon and sends you a customized notifica…☆12Nov 12, 2020Updated 5 years ago
- Get latest Exploit Databases notification on your Desktop☆16Jan 29, 2020Updated 6 years ago
- C# implementation of Out-Minidump.ps1☆10Jul 13, 2018Updated 7 years ago
- Embedding a "UAC-Bypassing" function into your custom payload☆98Aug 13, 2022Updated 3 years ago
- 🔎 Help find Trojan Source vulnerability in code 👀 . Useful for code review in project with multiple collaborators (CI/CD)☆47Dec 6, 2023Updated 2 years ago
- A simple Windows and Linux RAT/Backdoor + Keylogger written in Python3 using sockets☆64Aug 3, 2023Updated 2 years ago