solusipse / spectrologyLinks
Images to audio files with corresponding spectrograms encoder.
☆278Updated last year
Alternatives and similar repositories for spectrology
Users that are interested in spectrology are comparing it to the libraries listed below
Sorting:
- Audio file steganography. Hides files or text inside audio files and retrieve them automatically☆290Updated 2 years ago
- UNMAINTAINED. USE AT OWN RISK. Stegdetect is an automated tool for detecting steganographic content in images.☆413Updated 6 years ago
- SteCoSteg is OutGuess successor and Vernam cipher analog in steganography.☆56Updated 6 years ago
- Zero-Width Space Steganography, encodes/decodes hidden messages as non printable/readable characters.☆151Updated 6 months ago
- A steganalysis tool for detecting LSB steganography in images☆221Updated 7 years ago
- Freedom Fighting Mode: open source hacking harness☆340Updated last year
- Funtenna P0C code demonstrated at Blackhat 2015☆91Updated 10 years ago
- usbWatchdog - monitor changes to your usb ports, and if anything is plugged in or removed, wipe RAM and shut down.☆49Updated 8 years ago
- Execute a brute force attack with Steghide to file with hide information and password established☆119Updated 4 years ago
- Yet another Stego Tool☆389Updated 2 years ago
- A simple capture the flag framework.☆122Updated 8 years ago
- Steganography brute-force utility to uncover hidden data inside files☆577Updated 4 years ago
- A collection of scripts which may come in handy during your freedom fighting activities.☆410Updated 2 years ago
- BadUSB 2.0 USB-HID MiTM POC☆284Updated 9 years ago
- Build two PDFs that have different content but identical SHA1 sums.☆438Updated 7 months ago
- Some exploits and exploit development stuff.☆148Updated 3 years ago
- SSLStrip version to defeat HSTS☆318Updated 7 years ago
- A pure Python steganography module.☆569Updated this week
- Veracrypt Password Cracker☆80Updated 2 years ago
- Password Hash Identification☆220Updated 11 years ago
- cribdrag - an interactive crib dragging tool for cryptanalysis on ciphertext generated with reused or predictable stream cipher keys☆174Updated 5 years ago
- Python program to steganography files into images using the Least Significant Bit.☆936Updated 3 years ago
- just for fun ¯\_(ツ)_/¯☆274Updated 8 years ago
- Database of private SSL/SSH keys for embedded devices☆265Updated last year
- anti-forensic tool that writes udev rules for known usb devices and do some things at unknown usb insertion or specific usb device remova…☆131Updated 8 years ago
- A Reverse Engineering Tool for py2exe applications.☆210Updated 8 years ago
- Various PoCs☆490Updated 5 years ago
- A fast and modular scanner for Tor exit relays. The canonical repository (including issue tracker) is at https://gitlab.torproject.org/tp…☆458Updated last year
- Foremost is a console program to recover files based on their headers, footers, and internal data structures. This process is commonly re…☆330Updated 2 years ago
- Framework for Man-In-The-Middle attacks☆189Updated 8 years ago