srli / image_steganographyLinks
Fun exercises on image steganography in Python
☆13Updated 8 years ago
Alternatives and similar repositories for image_steganography
Users that are interested in image_steganography are comparing it to the libraries listed below
Sorting:
- Embeds messages into images using the Least Significant Bit algorithm☆11Updated 2 years ago
- A basic example of how to use Least Significant Bit steganography on a BMP image☆15Updated 2 years ago
- A steganalysis tool for detecting LSB steganography in images☆223Updated 7 years ago
- Python script that acts like the original sudo binary to fool users into entering their passwords☆73Updated 5 years ago
- Data exfiltration using covert channels in the TCP/IP protocol with some basic steganography.☆13Updated 8 years ago
- Least-Significant-Bit tool for steganography☆81Updated 7 years ago
- Kerang is a Another Webshell Backdoor, For Educational Purposes!☆15Updated 7 years ago
- A python based dropper, that uses steganography and an image over http to transfer a file☆59Updated 9 years ago
- This is a Python module which facilitates text hiding in an image, using the LSB technique. It was made using Python 3.4.2 and the PIL im…☆10Updated 6 years ago
- Scans the internet for open FTP servers looking for common malware bot droppers and grabs them for sampling. Also provides support for up…☆48Updated 8 years ago
- My presentations from different conferences☆15Updated 7 years ago
- ☆90Updated 8 years ago
- ssh public host key scanner using shodan☆117Updated 6 years ago
- ~ BannerGrab☆25Updated 8 years ago
- Autoexploitation of some of the most common vulnerabilities in wild☆122Updated 7 years ago
- Intelligent threat hunter and phishing servers☆47Updated 6 years ago
- Some tools to monitor BillGates CnC servers☆135Updated 11 years ago
- ☆40Updated 11 years ago
- A simple steganalysis script writen in Python☆26Updated 11 years ago
- Metasploit Usage Wiki☆47Updated 10 years ago
- OpenSSL Heartbleed (CVE-2014-0160) vulnerability scanner, data miner and RSA key-restore tools.☆98Updated 11 years ago
- Scan/Exploit Blueborne CVE-2017-0785☆29Updated 7 years ago
- A simple Shellshock scanner in python☆41Updated 10 years ago
- Writeups for CTF competitions.☆33Updated 9 years ago
- Proof-of-Concept exploits for D-Link DIR8xx routers☆37Updated 8 years ago
- python client/server keystroke logger☆23Updated 12 years ago
- Linux rootkit and detection examples☆32Updated 9 years ago
- Advanced Netstat Using Python For Windows☆46Updated 8 years ago
- Linux backdoor implementation written in Python☆58Updated 10 years ago
- CTF (Capture The Flag Writeups and Tools)☆55Updated 6 years ago