solusipse / spectrologyLinks
Images to audio files with corresponding spectrograms encoder.
☆277Updated last year
Alternatives and similar repositories for spectrology
Users that are interested in spectrology are comparing it to the libraries listed below
Sorting:
- Audio file steganography. Hides files or text inside audio files and retrieve them automatically☆290Updated 2 years ago
- A collection of scripts which may come in handy during your freedom fighting activities.☆409Updated 2 years ago
- SteCoSteg is OutGuess successor and Vernam cipher analog in steganography.☆56Updated 6 years ago
- Execute a brute force attack with Steghide to file with hide information and password established☆121Updated 5 years ago
- SSLStrip version to defeat HSTS☆321Updated 8 years ago
- UNMAINTAINED. USE AT OWN RISK. Stegdetect is an automated tool for detecting steganographic content in images.☆416Updated 7 years ago
- Don't Skype & Type! Keyboard acoustic eavesdropping tool.☆317Updated 6 years ago
- Offensive DNS server☆322Updated 3 years ago
- Various PoCs☆492Updated 5 years ago
- This is a POC to show it is possible to capture enough of a handshake with a user from a fake AP to crack a WPA2 network without knowing …☆589Updated 3 years ago
- BadUSB 2.0 USB-HID MiTM POC☆287Updated 9 years ago
- Zero-Width Space Steganography, encodes/decodes hidden messages as non printable/readable characters.☆151Updated 8 months ago
- Create fake AP in Kali with 1 command☆269Updated 9 years ago
- PyMultitor - Python Multi Threaded Tor Proxy☆574Updated 2 months ago
- Freedom Fighting Mode: open source hacking harness☆340Updated last year
- A steganalysis tool for detecting LSB steganography in images☆226Updated 7 years ago
- 🔓 A dynamic dictionary merger for successful dictionary based attacks.☆227Updated 4 years ago
- A braindead program for cracking encrypted ZIP archives. Forked from http://oldhome.schmorp.de/marc/fcrackzip.html☆458Updated 2 years ago
- usbWatchdog - monitor changes to your usb ports, and if anything is plugged in or removed, wipe RAM and shut down.☆49Updated 8 years ago
- A simple utility to convert EXE files to JPEG images and vice versa.☆204Updated 10 years ago
- powerful auto-backdooring utility☆751Updated 7 years ago
- Ability to detect suspicious activity such as (WEP/WPA/WPS) attack by sniffing the air for wireless packets.☆268Updated 11 years ago
- A mirror of the original SSLstrip+ code by Leonardo Nve☆182Updated 7 years ago
- just for fun ¯\_(ツ)_/¯☆272Updated 9 years ago
- Password Hash Identification☆221Updated 11 years ago
- BEURK Experimental Unix RootKit☆384Updated 8 years ago
- Funtenna P0C code demonstrated at Blackhat 2015☆93Updated 10 years ago
- Python Pastebin Webcrawler that returns list of public pastebins containing keywords☆436Updated 4 years ago
- Nameserver DNS poisoning attacks made easy☆525Updated 8 years ago
- Detect and prevent KRACK attacks in your network☆182Updated 8 years ago