solusipse / spectrologyLinks
Images to audio files with corresponding spectrograms encoder.
☆278Updated last year
Alternatives and similar repositories for spectrology
Users that are interested in spectrology are comparing it to the libraries listed below
Sorting:
- Audio file steganography. Hides files or text inside audio files and retrieve them automatically☆292Updated 2 years ago
- SteCoSteg is OutGuess successor and Vernam cipher analog in steganography.☆56Updated 6 years ago
- A collection of scripts which may come in handy during your freedom fighting activities.☆410Updated 2 years ago
- UNMAINTAINED. USE AT OWN RISK. Stegdetect is an automated tool for detecting steganographic content in images.☆418Updated 7 years ago
- A steganalysis tool for detecting LSB steganography in images☆229Updated 7 years ago
- Steganography brute-force utility to uncover hidden data inside files☆580Updated 4 years ago
- Freedom Fighting Mode: open source hacking harness☆342Updated last year
- Execute a brute force attack with Steghide to file with hide information and password established☆121Updated 5 years ago
- Ability to detect suspicious activity such as (WEP/WPA/WPS) attack by sniffing the air for wireless packets.☆269Updated 11 years ago
- Funtenna P0C code demonstrated at Blackhat 2015☆93Updated 10 years ago
- Python program to steganography files into images using the Least Significant Bit.☆941Updated 3 years ago
- SSLStrip version to defeat HSTS☆321Updated 8 years ago
- Zero-Width Space Steganography, encodes/decodes hidden messages as non printable/readable characters.☆151Updated 9 months ago
- just for fun ¯\_(ツ)_/¯☆272Updated 9 years ago
- A simple log viewer for cowrie☆25Updated 5 years ago
- Detect hidden files and text in images☆122Updated 2 years ago
- Offensive DNS server☆323Updated 3 years ago
- Yet another Stego Tool☆398Updated 2 years ago
- Mirror of Shadowbrokers release from https://steemit.com/shadowbrokers/@theshadowbrokers/lost-in-translation☆478Updated 8 years ago
- Blueborne CVE-2017-0785 Android information leak vulnerability☆469Updated 8 years ago
- Proof-of-concept of the KRACK attack against Linux and Android☆157Updated 7 years ago
- BadUSB 2.0 USB-HID MiTM POC☆287Updated 9 years ago
- A Software Defined Radio Attack Tool☆542Updated 10 months ago
- Polymorph is a real-time network packet manipulation framework with support for almost all existing protocols☆491Updated 9 months ago
- NTP Main-in-the-Middle tool☆247Updated 3 years ago
- Password Hash Identification☆222Updated 11 years ago
- A simple capture the flag framework.☆124Updated 8 years ago
- Some exploits and exploit development stuff.☆150Updated 3 years ago
- Krack POC☆125Updated 7 years ago
- Database of private SSL/SSH keys for embedded devices☆267Updated last year