solusipse / spectrologyLinks
Images to audio files with corresponding spectrograms encoder.
☆278Updated last year
Alternatives and similar repositories for spectrology
Users that are interested in spectrology are comparing it to the libraries listed below
Sorting:
- Audio file steganography. Hides files or text inside audio files and retrieve them automatically☆294Updated 2 years ago
- A collection of scripts which may come in handy during your freedom fighting activities.☆411Updated 2 years ago
- Freedom Fighting Mode: open source hacking harness☆344Updated last year
- BadUSB 2.0 USB-HID MiTM POC☆288Updated 9 years ago
- A braindead program for cracking encrypted ZIP archives. Forked from http://oldhome.schmorp.de/marc/fcrackzip.html☆462Updated 2 years ago
- BlackNurse attack PoC☆176Updated this week
- UNMAINTAINED. USE AT OWN RISK. Stegdetect is an automated tool for detecting steganographic content in images.☆419Updated 7 years ago
- Zero-Width Space Steganography, encodes/decodes hidden messages as non printable/readable characters.☆151Updated 10 months ago
- SteCoSteg is OutGuess successor and Vernam cipher analog in steganography.☆56Updated 6 years ago
- A simple capture the flag framework.☆125Updated 8 years ago
- SSLStrip version to defeat HSTS☆322Updated 8 years ago
- Yet another Stego Tool☆399Updated 2 years ago
- Funtenna P0C code demonstrated at Blackhat 2015☆93Updated 10 years ago
- A fully featured backdoor that uses Twitter as a C&C server☆785Updated 5 years ago
- Don't Skype & Type! Keyboard acoustic eavesdropping tool.☆318Updated 6 years ago
- Some exploits and exploit development stuff.☆152Updated 3 years ago
- Seed recovery tool for PRNGs☆386Updated 7 years ago
- Password Hash Identification☆222Updated 12 years ago
- just for fun ¯\_(ツ)_/¯☆273Updated 9 years ago
- ☆120Updated 6 years ago
- Steganography brute-force utility to uncover hidden data inside files☆581Updated 5 years ago
- Various PoCs☆492Updated 5 years ago
- Spawn to shell without any credentials by using CVE-2018-10933 (LibSSH)☆498Updated 2 years ago
- Automated Linux evil maid attack☆433Updated 10 years ago
- Execute a brute force attack with Steghide to file with hide information and password established☆121Updated 5 years ago
- Use your Shodan API Key to dump all the contents of exposed memcached servers.☆142Updated 7 years ago
- HORSEPILL rootkit PoC☆230Updated 9 years ago
- An automated script that download potential exploit for linux kernel from exploitdb, and compile them automatically☆491Updated 4 years ago
- usbWatchdog - monitor changes to your usb ports, and if anything is plugged in or removed, wipe RAM and shut down.☆49Updated 8 years ago
- A tool to find and exploit servers vulnerable to Shellshock☆328Updated 2 years ago