solusipse / spectrologyLinks
Images to audio files with corresponding spectrograms encoder.
☆277Updated last year
Alternatives and similar repositories for spectrology
Users that are interested in spectrology are comparing it to the libraries listed below
Sorting:
- Audio file steganography. Hides files or text inside audio files and retrieve them automatically☆293Updated 2 years ago
- SteCoSteg is OutGuess successor and Vernam cipher analog in steganography.☆56Updated 6 years ago
- Yet another Stego Tool☆401Updated 2 years ago
- UNMAINTAINED. USE AT OWN RISK. Stegdetect is an automated tool for detecting steganographic content in images.☆422Updated 7 years ago
- Execute a brute force attack with Steghide to file with hide information and password established☆121Updated 5 years ago
- A braindead program for cracking encrypted ZIP archives. Forked from http://oldhome.schmorp.de/marc/fcrackzip.html☆465Updated 2 years ago
- Python program to steganography files into images using the Least Significant Bit.☆949Updated 3 years ago
- usbWatchdog - monitor changes to your usb ports, and if anything is plugged in or removed, wipe RAM and shut down.☆49Updated 8 years ago
- Freedom Fighting Mode: open source hacking harness☆345Updated last year
- A collection of scripts which may come in handy during your freedom fighting activities.☆412Updated 2 years ago
- Steganography brute-force utility to uncover hidden data inside files☆588Updated 5 years ago
- Zero-Width Space Steganography, encodes/decodes hidden messages as non printable/readable characters.☆153Updated 11 months ago
- Don't Skype & Type! Keyboard acoustic eavesdropping tool.☆320Updated 6 years ago
- SSLStrip version to defeat HSTS☆323Updated 8 years ago
- Detect hidden files and text in images☆126Updated 2 years ago
- Guides, Tools, Tips and such for working with the Shadow Brokers dumps☆240Updated 7 years ago
- Foremost is a console program to recover files based on their headers, footers, and internal data structures. This process is commonly re…☆359Updated 2 years ago
- Blueborne CVE-2017-0785 Android information leak vulnerability☆472Updated 8 years ago
- Some exploits and exploit development stuff.☆152Updated 3 years ago
- Detect and prevent KRACK attacks in your network☆183Updated 8 years ago
- Stealing CSRF tokens with CSS injection (without iFrames)☆323Updated 8 years ago
- Hash cracker☆57Updated 7 years ago
- ☆120Updated 6 years ago
- 🔓 A dynamic dictionary merger for successful dictionary based attacks.☆228Updated 4 years ago
- Router EXploitation Toolkit - small toolkit for easy creation and usage of various python scripts that work with embedded devices.☆347Updated 9 years ago
- Build two PDFs that have different content but identical SHA1 sums.☆442Updated last year
- A simple capture the flag framework.☆125Updated 8 years ago
- port of mimipenguin.sh in python with some additional protection features☆216Updated 8 years ago
- BadUSB 2.0 USB-HID MiTM POC☆289Updated 9 years ago
- Funtenna P0C code demonstrated at Blackhat 2015☆93Updated 10 years ago