solusipse / spectrologyLinks
Images to audio files with corresponding spectrograms encoder.
☆278Updated last year
Alternatives and similar repositories for spectrology
Users that are interested in spectrology are comparing it to the libraries listed below
Sorting:
- Audio file steganography. Hides files or text inside audio files and retrieve them automatically☆290Updated 2 years ago
- A collection of scripts which may come in handy during your freedom fighting activities.☆410Updated 2 years ago
- Execute a brute force attack with Steghide to file with hide information and password established☆119Updated 5 years ago
- UNMAINTAINED. USE AT OWN RISK. Stegdetect is an automated tool for detecting steganographic content in images.☆414Updated 6 years ago
- Detect and prevent KRACK attacks in your network☆182Updated 7 years ago
- SSLStrip version to defeat HSTS☆319Updated 8 years ago
- BadUSB 2.0 USB-HID MiTM POC☆285Updated 9 years ago
- A steganalysis tool for detecting LSB steganography in images☆223Updated 7 years ago
- Foremost is a console program to recover files based on their headers, footers, and internal data structures. This process is commonly re…☆332Updated 2 years ago
- Freedom Fighting Mode: open source hacking harness☆341Updated last year
- SteCoSteg is OutGuess successor and Vernam cipher analog in steganography.☆56Updated 6 years ago
- Various PoCs☆491Updated 5 years ago
- Twitter as an extra entropy source☆104Updated 7 years ago
- Offensive DNS server☆320Updated 3 years ago
- Funtenna P0C code demonstrated at Blackhat 2015☆91Updated 10 years ago
- Some exploits and exploit development stuff.☆148Updated 3 years ago
- usbWatchdog - monitor changes to your usb ports, and if anything is plugged in or removed, wipe RAM and shut down.☆49Updated 8 years ago
- Don't Skype & Type! Keyboard acoustic eavesdropping tool.☆318Updated 6 years ago
- A simple utility to convert EXE files to JPEG images and vice versa.☆202Updated 10 years ago
- Wireless mouse/keyboard attack with replay/transmit poc☆89Updated 9 years ago
- Wireless Probe Requests Sniffer☆190Updated 3 years ago
- Steganography brute-force utility to uncover hidden data inside files☆576Updated 4 years ago
- Python bindings for hashcat☆63Updated 6 years ago
- Krack POC☆125Updated 7 years ago
- just for fun ¯\_(ツ)_/¯☆274Updated 9 years ago
- Least Significant Bit Steganography for bitmap images (.bmp and .png), WAV sound files, and byte sequences. Simple LSB Steganalysis (LSB …☆631Updated 11 months ago
- A simple capture the flag framework.☆123Updated 8 years ago
- Framework for Man-In-The-Middle attacks☆189Updated 8 years ago
- Zero-Width Space Steganography, encodes/decodes hidden messages as non printable/readable characters.☆151Updated 7 months ago
- Blueborne CVE-2017-0785 Android information leak vulnerability☆466Updated 7 years ago