samolds / wavstegLinks
Steganographic coder for WAV files
☆15Updated 7 years ago
Alternatives and similar repositories for wavsteg
Users that are interested in wavsteg are comparing it to the libraries listed below
Sorting:
- Extract and Visualize Data from URLs using Unfurl☆9Updated 3 years ago
- The hacker technical cheat sheet☆40Updated 2 weeks ago
- Monitoring Registry and File Changes in Windows☆72Updated last year
- research chrome stored databases - dumping all urls☆41Updated 7 years ago
- Collection of exploits that were verified by an automated system☆13Updated 4 years ago
- linux c++, fox-toolkit, multi-threaded forensic gui tool☆49Updated 11 months ago
- A repository for maintaining a list of the top domains based on multiple lists☆21Updated 3 years ago
- Kali Linux extra useful packages for CTF and Pentest activities☆11Updated 3 weeks ago
- Autopsy plugin to extract information from the 'Your Phone' Windows 10 App☆13Updated 4 years ago
- ☆17Updated last year
- Digital Forensics date and time☆24Updated 6 months ago
- Collection of tools for processing storage media images☆14Updated 6 months ago
- Information Stealers Wall of Sheep (IS-WOS)☆12Updated 4 years ago
- Scapytain is a web application that enables you to store, organise and run test campaigns on top of Scapy.☆19Updated 7 years ago
- Test Suite for John the Ripper☆24Updated 3 years ago
- Agile Sandbox for analyzing Windows, Linux and macOS malware and execution behaviors☆71Updated last year
- ToolsWatch and Black Hat Arsenal selection of badges☆56Updated 8 months ago
- Android application which allows sending SMS, with a specific SMSC without changing system defaults.☆13Updated 11 years ago
- Maltego integration of https://abusix.com☆17Updated 6 years ago
- ☆53Updated 6 months ago
- ☆11Updated last year
- Collection of CVEs from Sick Codes, or collaborations on https://sick.codes security research & advisories.☆89Updated 2 years ago
- New version of the buildkit repository☆9Updated 3 years ago
- ☆14Updated 4 years ago
- Man-in-the-middle against Tor bridges☆26Updated 5 years ago
- A collection of attacks metadata that were used in my previous pen-test tools☆17Updated 2 years ago
- How long will it take to crack a hash ?☆29Updated 5 years ago
- Warning! Don't run this code on your computer.☆15Updated 6 years ago
- USB testing framework☆15Updated 2 years ago
- Darkside Ransomware☆12Updated 4 years ago