SecretPixel is a cutting-edge steganography tool designed to securely conceal sensitive information within images. It stands out in the realm of digital steganography by combining advanced encryption, compression, and a seeded Least Significant Bit (LSB) technique to provide a robust solution for embedding data undetectably.
☆344Feb 4, 2025Updated last year
Alternatives and similar repositories for SecretPixel
Users that are interested in SecretPixel are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- File Hider is a sophisticated tool that allows you to securely hide and encrypt a file within another file using multiple layers of AES-2…☆144Jan 15, 2024Updated 2 years ago
- A 2FA CLI tool for generating 2FA codes using TOTP secrets, and an optional web ui enabling 2FA code generation from any device☆54Mar 28, 2025Updated last year
- CryptoFrame is a command-line tool engineered for the secure practice of steganography within video files.☆44Jan 18, 2024Updated 2 years ago
- Password management through LSB image steganography.☆50Jan 10, 2025Updated last year
- 针对多个框架的高度自定义的内存马一键打入工具 | A highly customized memory shell one-click injection tool for multiple frameworks☆49Feb 6, 2024Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- 0up is a zero-knowledge, open-source, encrypted file sharing service☆128Updated this week
- ☆570Mar 28, 2024Updated 2 years ago
- Convert YouTube videos to high-quality GIF's.☆78Oct 4, 2025Updated 6 months ago
- Example code samples from our ScriptBlock Smuggling Blog post☆94Jun 18, 2024Updated last year
- OSINT tool to crawl a site and extract useful recon info.☆460Aug 13, 2025Updated 8 months ago
- Inject DLLs into the explorer process using icons☆407May 18, 2025Updated 10 months ago
- A Python script that anonymizes an Excel file and synthesizes new data in its place.☆84Sep 25, 2025Updated 6 months ago
- Small toolkit for extracting information and dumping sensitive strings from Windows processes☆117Jul 17, 2024Updated last year
- Goosle is dead. Consider using GooseTOR instead.☆131Apr 7, 2026Updated last week
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆51Oct 12, 2024Updated last year
- IoT Camera Reconnaissance and Live Viewer☆183Jul 30, 2024Updated last year
- Reverse shell that can bypass windows defender detection☆172Mar 31, 2026Updated 2 weeks ago
- Enumerate SSN (System Service Numbers or Syscall ID) and syscall instruction address in ntdll module by parsing the PEB of the current pr…☆21Jan 28, 2024Updated 2 years ago
- A POC to disable TamperProtection and other Defender / MDE components☆255Jun 6, 2024Updated last year
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆45Mar 8, 2024Updated 2 years ago
- TempMail is a simple web application that allows you to generate temporary email addresses and view the emails received by these addresse…☆113Feb 8, 2026Updated 2 months ago
- Work, timer, and wait callback example using solely Native Windows APIs.☆88Feb 11, 2024Updated 2 years ago
- A browser extension that allows you to use steganography based password images to log into accounts.☆56Mar 5, 2024Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Detect the state of your RBF.☆17Feb 16, 2024Updated 2 years ago
- This project is an implant framework designed for long term persistent access to Windows machines.☆108Sep 22, 2023Updated 2 years ago
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆66Mar 6, 2024Updated 2 years ago
- Modify managed functions from unmanaged code☆53Feb 1, 2024Updated 2 years ago
- PacketSpy☆157May 31, 2024Updated last year
- powerfull pentesting tool to checking email by smtp command☆10Feb 29, 2024Updated 2 years ago
- Modern web-based distributed hashcracking solution, built on hashcat☆191Apr 10, 2026Updated last week
- Stega Shade CLI is a user-friendly command-line interface tool designed for image-based steganography. With a focus on simplicity and sec…☆41Jul 19, 2025Updated 8 months ago
- Simple and secure secret sharing in the browser☆54Mar 30, 2025Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Unleash Metadata Intelligence with MetaDetective. Your Assistant Beyond Metagoofil.☆455Mar 28, 2026Updated 2 weeks ago
- Spoofing desktop login applications with WinForms and WPF☆177Feb 19, 2024Updated 2 years ago
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆152May 3, 2024Updated last year
- Exfiltrate sensitive user data from apps on Android 12 and 13 using CVE-2024-0044 vulnerability remotely☆77Jul 31, 2024Updated last year
- H.I.V.E is an automated OSINT (Open Source Intelligence) multi-tool that enables efficient data gathering from various sources through th…☆300Jul 21, 2024Updated last year
- Analyse MSI files for vulnerabilities☆143Aug 30, 2024Updated last year
- C# tool to identify and exploit weaknesses within MSSQL instances in Active Directory environments☆115Feb 13, 2022Updated 4 years ago