rafael-santiago / mr-hydeLinks
A collection of steganography tools.
☆15Updated 5 years ago
Alternatives and similar repositories for mr-hyde
Users that are interested in mr-hyde are comparing it to the libraries listed below
Sorting:
- A collection of toy programs for teaching buffer overflow vulnerabilities.☆55Updated 10 years ago
- A collection of crackmes☆40Updated 10 months ago
- ☆17Updated 11 years ago
- SSH Man In The Middle proxy with credentials interception, asciinema session replay, ...☆23Updated 8 years ago
- Detect snooper on your system!☆84Updated 8 years ago
- Detect some forms of linux kernel tampering☆12Updated 10 years ago
- free crypto audit☆31Updated 8 years ago
- Project for the Crypto subject at Uni☆18Updated 8 years ago
- Various cryptographic backdoors and tools to detect them☆21Updated 10 years ago
- ASM Malicious code - PE infector☆72Updated 8 years ago
- ☆12Updated 9 years ago
- An experimental implementation of a bot client which interprets commands through Twitter, thus requiring no hosting of servers from the c…☆43Updated 10 years ago
- DeCryKe is a technique to transform almost any cryptographic algorithm into deniable-one, it is a decry of Russia's anti-terrorism law (a…☆23Updated 7 years ago
- A Qt-based disassembly viewer based on radare2☆76Updated 7 years ago
- Uses Shodan to locate HackingTeam C&C Servers.☆79Updated 10 years ago
- Metasploit pattern generator in Python, modified to be used as a function☆23Updated 10 years ago
- Basic command line, text-based, shellcode debugger.☆92Updated 8 years ago
- Tools for attacking cryptographic implementations.☆21Updated 9 years ago
- Collection of somewhat useful stuff for CTF events☆36Updated 10 years ago
- Learn the very basics of different languages☆49Updated 7 months ago
- Under Your Radar (UYR): Exfiltration using Steganography☆18Updated 10 years ago
- A demo of altering an opened tab after a timer☆123Updated 9 years ago
- Automated Data Model and State Machine Inference of Previously Unobserved Network Protocols☆14Updated 9 years ago
- A debugger frontend☆141Updated 10 years ago
- Educational virus written in Assembly that infects 32-bit ELF executables on Linux using the data segment infection method☆79Updated 8 years ago
- A simple cryptosystem that provides provable plausibly deniable encryption.☆90Updated 6 years ago
- Run basic functions from stripped binaries cross platform☆112Updated 8 years ago
- PoC for getting remote HTTP Server date using gzip compressed HTTP Response☆56Updated 9 years ago
- Create shellcode from executable or assembly code☆12Updated 8 years ago
- Desktop shortcuts (.desktop) create a risk for code execution via social engineering☆10Updated 8 years ago