SecretPixel is a cutting-edge steganography tool designed to securely conceal sensitive information within images. It stands out in the realm of digital steganography by combining advanced encryption, compression, and a seeded Least Significant Bit (LSB) technique to provide a robust solution for embedding data undetectably.
☆343Feb 4, 2025Updated last year
Alternatives and similar repositories for SecretPixel
Users that are interested in SecretPixel are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- File Hider is a sophisticated tool that allows you to securely hide and encrypt a file within another file using multiple layers of AES-2…☆144Jan 15, 2024Updated 2 years ago
- A 2FA CLI tool for generating 2FA codes using TOTP secrets, and an optional web ui enabling 2FA code generation from any device☆54Mar 28, 2025Updated 11 months ago
- CryptoFrame is a command-line tool engineered for the secure practice of steganography within video files.☆45Jan 18, 2024Updated 2 years ago
- Password management through LSB image steganography.☆50Jan 10, 2025Updated last year
- 针对多个框架的高度自定义的内存马一键打入工具 | A highly customized memory shell one-click injection tool for multiple frameworks☆49Feb 6, 2024Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- 0up is a zero-knowledge, open-source, encrypted file sharing service☆128Mar 9, 2024Updated 2 years ago
- ☆569Mar 28, 2024Updated last year
- Convert YouTube videos to high-quality GIF's.☆77Oct 4, 2025Updated 5 months ago
- Example code samples from our ScriptBlock Smuggling Blog post☆95Jun 18, 2024Updated last year
- OSINT tool to crawl a site and extract useful recon info.☆459Aug 13, 2025Updated 7 months ago
- Inject DLLs into the explorer process using icons☆407May 18, 2025Updated 10 months ago
- A Python script that anonymizes an Excel file and synthesizes new data in its place.☆84Sep 25, 2025Updated 6 months ago
- Small toolkit for extracting information and dumping sensitive strings from Windows processes☆117Jul 17, 2024Updated last year
- The best Meta Search engine for finding magnet links, running on simple PHP servers or localhosts. Keep privacy and ease of use in mind!☆131Mar 17, 2026Updated last week
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆51Oct 12, 2024Updated last year
- IoT Camera Reconnaissance and Live Viewer☆182Jul 30, 2024Updated last year
- Reverse shell that can bypass windows defender detection☆171Feb 3, 2024Updated 2 years ago
- Enumerate SSN (System Service Numbers or Syscall ID) and syscall instruction address in ntdll module by parsing the PEB of the current pr…☆21Jan 28, 2024Updated 2 years ago
- A POC to disable TamperProtection and other Defender / MDE components☆255Jun 6, 2024Updated last year
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆45Mar 8, 2024Updated 2 years ago
- TempMail is a simple web application that allows you to generate temporary email addresses and view the emails received by these addresse…☆107Feb 8, 2026Updated last month
- Work, timer, and wait callback example using solely Native Windows APIs.☆88Feb 11, 2024Updated 2 years ago
- A browser extension that allows you to use steganography based password images to log into accounts.☆56Mar 5, 2024Updated 2 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Detect the state of your RBF.☆18Feb 16, 2024Updated 2 years ago
- This project is an implant framework designed for long term persistent access to Windows machines.☆108Sep 22, 2023Updated 2 years ago
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆66Mar 6, 2024Updated 2 years ago
- Modify managed functions from unmanaged code☆53Feb 1, 2024Updated 2 years ago
- Simple and secure secret sharing in the browser☆54Mar 30, 2025Updated 11 months ago
- PacketSpy☆157May 31, 2024Updated last year
- powerfull pentesting tool to checking email by smtp command☆10Feb 29, 2024Updated 2 years ago
- Stega Shade CLI is a user-friendly command-line interface tool designed for image-based steganography. With a focus on simplicity and sec…☆42Jul 19, 2025Updated 8 months ago
- Modern web-based distributed hashcracking solution, built on hashcat☆191Mar 19, 2026Updated last week
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Unleash Metadata Intelligence with MetaDetective. Your Assistant Beyond Metagoofil.☆442Updated this week
- Spoofing desktop login applications with WinForms and WPF☆177Feb 19, 2024Updated 2 years ago
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆151May 3, 2024Updated last year
- H.I.V.E is an automated OSINT (Open Source Intelligence) multi-tool that enables efficient data gathering from various sources through th…☆298Jul 21, 2024Updated last year
- Exfiltrate sensitive user data from apps on Android 12 and 13 using CVE-2024-0044 vulnerability remotely☆77Jul 31, 2024Updated last year
- Analyse MSI files for vulnerabilities☆142Aug 30, 2024Updated last year
- C# tool to identify and exploit weaknesses within MSSQL instances in Active Directory environments☆113Feb 13, 2022Updated 4 years ago