Hide secret texts inside an image, optionally encrypt them with a password using AES-256.
☆114Sep 14, 2023Updated 2 years ago
Alternatives and similar repositories for imghide
Users that are interested in imghide are comparing it to the libraries listed below
Sorting:
- An automation script written in Python to convert a Raspberry Pi into a WiFi hacking device☆71Nov 7, 2022Updated 3 years ago
- This is a simple tool to automatically deface vulnerable websites☆12Oct 16, 2025Updated 4 months ago
- Material del Curso de Hacking Etico con Python☆12May 7, 2023Updated 2 years ago
- A simple pyhon instagram direct bot☆14Jul 4, 2021Updated 4 years ago
- Simple username generator based on a list of name and surname☆13May 20, 2021Updated 4 years ago
- This tool generates an undetectable Windows reverse shell PowerShell script. Users can configure IP and Port according to their requireme…☆18Jul 16, 2024Updated last year
- This repository contains combined exploits for two vulnerabilities in Moodle, a widely used open-source learning management system (LMS)☆18Mar 13, 2024Updated last year
- Default Password Generator for Time Warner / Spectrum Routers☆19Jul 27, 2017Updated 8 years ago
- Check IP addresses against known cloud provider IP address ranges☆47Feb 7, 2026Updated last month
- Hacking with PasteJacking technique☆22Jul 2, 2024Updated last year
- CVE-2024-2879 - LayerSlider 7.9.11 - 7.10.0 - Unauthenticated SQL Injection☆23Apr 8, 2024Updated last year
- 🗺 A map of OSINT tools.☆19Jul 5, 2023Updated 2 years ago
- ☆30Aug 4, 2023Updated 2 years ago
- Retrieves and aggregates public OSINT data about a GitHub user using Go and the GitHub API. Finds hidden emails in commit history, previo…☆39Sep 24, 2025Updated 5 months ago
- This project is an implant framework designed for long term persistent access to Windows machines.☆108Sep 22, 2023Updated 2 years ago
- bash script for automating subdomain enumeration process either passive or active☆29Feb 24, 2026Updated last week
- Herramienta enfocada a Blindar/Proteger nuestro equipo para que todo rastro que deje en Internet o en Redes Locales sea Falso e Inrasteab…☆29Sep 1, 2023Updated 2 years ago
- Red Team Stored XSS SVG phishing-companion tool with the ability to serve a malicious login page, or clone an html page and implement cus…☆30Mar 31, 2023Updated 2 years ago
- A simple bot to copy post and send them from one channel to another without forwarded tag.☆12Sep 3, 2021Updated 4 years ago
- A cli tool to browse and play anime - IN ARABIC!☆24Jan 11, 2026Updated last month
- Onion Website Template☆10Oct 24, 2021Updated 4 years ago
- 🔍 Discover if a domain is resolvable or blocked by secure DNS and Ad-blocking services, and experience the innovative idea of DaaS - DNS…☆82Oct 18, 2025Updated 4 months ago
- Command Line For Truecaller Written In Python☆28Apr 30, 2024Updated last year
- This project explores secure remote access using Metasploit's reverse TCP payloads. Ethically and responsibly, we showcase potential risk…☆29Aug 13, 2023Updated 2 years ago
- ☆24Apr 15, 2022Updated 3 years ago
- A tool to enumerate and exploit SQL Servers in AD☆33Aug 21, 2023Updated 2 years ago
- Locky generates "really" strong yet easy to remember passwords.☆71May 5, 2019Updated 6 years ago
- Rat Inject is C++ Executable to gain Undetectable Persistence in Windows via 4 Registry Keys☆32Nov 29, 2022Updated 3 years ago
- OTP-BYPASS-2022 Signaling System is an international telecommunication protocol standard that defines how the network elements in a publi…☆12Oct 10, 2022Updated 3 years ago
- This is a templated to be used for QRL Jacking Sessions (Tested on Chrome,brave & firefox )☆13Feb 26, 2022Updated 4 years ago
- This will take Black MIDI to the next level!☆13Updated this week
- Telegram Auto Forward | auto Caption | Auto Text Replace | Movies info bot.☆16Nov 22, 2022Updated 3 years ago
- ME314 Introduction to Data Science and Big Data Analytics 2018☆10Jul 29, 2018Updated 7 years ago
- Example of using Sleep to create better named pipes.☆41Jul 25, 2023Updated 2 years ago
- 借用几十万弹幕迅速找出四大名著电视剧中的穿帮镜头☆12May 1, 2021Updated 4 years ago
- Game modes of Zombie Plague Special☆12Sep 3, 2023Updated 2 years ago
- Algeria administrative divisions, wilaya, daira, baladiyah, states, counties and districts☆10Dec 31, 2022Updated 3 years ago
- DragonMS is Tools for ddos, scanner, tracker, payload generator msfvenom and scraping☆78Jan 9, 2022Updated 4 years ago
- Powerful and smart Traffic Anonymizer using tor as a transparent proxy☆34May 24, 2025Updated 9 months ago