solusipse / spectrology
Images to audio files with corresponding spectrograms encoder.
☆269Updated 9 months ago
Alternatives and similar repositories for spectrology
Users that are interested in spectrology are comparing it to the libraries listed below
Sorting:
- Audio file steganography. Hides files or text inside audio files and retrieve them automatically☆280Updated last year
- Various PoCs☆491Updated 5 years ago
- ☆167Updated 6 years ago
- Python program to steganography files into images using the Least Significant Bit.☆923Updated 2 years ago
- Execute a brute force attack with Steghide to file with hide information and password established☆120Updated 4 years ago
- Unveiled at DEF CON 20, NTLM Relaying to ALL THE THINGS!☆259Updated 8 years ago
- Seed recovery tool for PRNGs☆381Updated 6 years ago
- Brosec - An interactive reference tool to help security professionals utilize useful payloads and commands.☆356Updated 2 years ago
- Build two PDFs that have different content but identical SHA1 sums.☆432Updated 3 months ago
- ☆102Updated 5 years ago
- CloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based S…☆1,601Updated 4 years ago
- UNMAINTAINED. USE AT OWN RISK. Stegdetect is an automated tool for detecting steganographic content in images.☆411Updated 6 years ago
- Funtenna P0C code demonstrated at Blackhat 2015☆90Updated 9 years ago
- Mellivora is a CTF engine written in PHP☆444Updated last year
- A Python Package for Data Exfiltration☆783Updated last year
- A fully featured backdoor that uses Twitter as a C&C server☆773Updated 4 years ago
- A steganalysis tool for detecting LSB steganography in images☆214Updated 6 years ago
- Steganography brute-force utility to uncover hidden data inside files☆570Updated 4 years ago
- Scoreboard for Capture The Flag competitions.☆169Updated 2 years ago
- File transfer via DNS☆73Updated 7 years ago
- Guides, Tools, Tips and such for working with the Shadow Brokers dumps☆228Updated 6 years ago
- Bypassing disabled exec functions in PHP (c) CRLF☆401Updated 4 years ago
- python module containing many classical cipher algorithms: Caesar, Vigenere, ADFGVX, Enigma etc.☆221Updated 4 years ago
- A Reverse Engineering Tool for py2exe applications.☆210Updated 7 years ago
- Public repository for improvements to the EXTRABACON exploit☆160Updated 8 years ago
- An experimental project to demonstrate how a user keyboard input may be sniffed through the pattern analysis of the sounds emitted by the…☆67Updated 8 years ago
- Python bindings for hashcat☆58Updated 5 years ago
- Apache Tomcat < 9.0.1 (Beta) / < 8.5.23 / < 8.0.47 / < 7.0.8 - JSP Upload Bypass / Remote Code Execution☆391Updated 7 years ago
- EoP (Win7) & BSoD (Win10) PoC for CVE-2016-0051 (MS-016)☆324Updated 9 years ago
- Encode an image to sound and view it as a spectrogram - turn your images into music☆281Updated 4 years ago