solusipse / spectrologyLinks
Images to audio files with corresponding spectrograms encoder.
☆276Updated last year
Alternatives and similar repositories for spectrology
Users that are interested in spectrology are comparing it to the libraries listed below
Sorting:
- Audio file steganography. Hides files or text inside audio files and retrieve them automatically☆291Updated 2 years ago
- SteCoSteg is OutGuess successor and Vernam cipher analog in steganography.☆56Updated 6 years ago
- A steganalysis tool for detecting LSB steganography in images☆231Updated 7 years ago
- UNMAINTAINED. USE AT OWN RISK. Stegdetect is an automated tool for detecting steganographic content in images.☆420Updated 7 years ago
- SSLStrip version to defeat HSTS☆323Updated 8 years ago
- Execute a brute force attack with Steghide to file with hide information and password established☆121Updated 5 years ago
- Python program to steganography files into images using the Least Significant Bit.☆949Updated 3 years ago
- BadUSB 2.0 USB-HID MiTM POC☆289Updated 9 years ago
- A collection of scripts which may come in handy during your freedom fighting activities.☆411Updated 2 years ago
- Proof-of-concept of the KRACK attack against Linux and Android☆157Updated 7 years ago
- This is a POC to show it is possible to capture enough of a handshake with a user from a fake AP to crack a WPA2 network without knowing …☆592Updated 3 years ago
- Detect and prevent KRACK attacks in your network☆183Updated 8 years ago
- Password Hash Identification☆222Updated this week
- Steganography brute-force utility to uncover hidden data inside files☆587Updated 5 years ago
- Ability to detect suspicious activity such as (WEP/WPA/WPS) attack by sniffing the air for wireless packets.☆272Updated 11 years ago
- Least Significant Bit Steganography for bitmap images (.bmp and .png), WAV sound files, and byte sequences. Simple LSB Steganalysis (LSB …☆642Updated 3 months ago
- Various PoCs☆502Updated 6 years ago
- Automated Linux evil maid attack☆434Updated 10 years ago
- Don't Skype & Type! Keyboard acoustic eavesdropping tool.☆318Updated 6 years ago
- BlackNurse attack PoC☆176Updated 3 weeks ago
- Freedom Fighting Mode: open source hacking harness☆344Updated last year
- Framework for Man-In-The-Middle attacks☆189Updated 8 years ago
- Offensive DNS server☆323Updated 4 years ago
- NTP Main-in-the-Middle tool☆250Updated 3 years ago
- Fuzzbunch deployment for Debian - Intructions: Readme.md☆142Updated 3 months ago
- port of mimipenguin.sh in python with some additional protection features☆215Updated 8 years ago
- just for fun ¯\_(ツ)_/¯☆276Updated 9 years ago
- Detect hidden files and text in images☆126Updated 2 years ago
- Just random files I've stored here for people to get access to because wordpress doesn't like python.☆83Updated 3 years ago
- Guides, Tools, Tips and such for working with the Shadow Brokers dumps☆241Updated 7 years ago