SecretPixel is a cutting-edge steganography tool designed to securely conceal sensitive information within images. It stands out in the realm of digital steganography by combining advanced encryption, compression, and a seeded Least Significant Bit (LSB) technique to provide a robust solution for embedding data undetectably.
☆343Feb 4, 2025Updated last year
Alternatives and similar repositories for SecretPixel
Users that are interested in SecretPixel are comparing it to the libraries listed below
Sorting:
- File Hider is a sophisticated tool that allows you to securely hide and encrypt a file within another file using multiple layers of AES-2…☆144Jan 15, 2024Updated 2 years ago
- A 2FA CLI tool for generating 2FA codes using TOTP secrets, and an optional web ui enabling 2FA code generation from any device☆54Mar 28, 2025Updated 11 months ago
- CryptoFrame is a command-line tool engineered for the secure practice of steganography within video files.☆45Jan 18, 2024Updated 2 years ago
- Password management through LSB image steganography.☆50Jan 10, 2025Updated last year
- ☆568Mar 28, 2024Updated last year
- 针对多个框架的高度自定义的内存马一键打入工具 | A highly customized memory shell one-click injection tool for multiple frameworks☆49Feb 6, 2024Updated 2 years ago
- 0up is a zero-knowledge, open-source, encrypted file sharing service☆127Mar 9, 2024Updated last year
- Convert YouTube videos to high-quality GIF's.☆77Oct 4, 2025Updated 5 months ago
- Example code samples from our ScriptBlock Smuggling Blog post☆95Jun 18, 2024Updated last year
- PacketSpy☆157May 31, 2024Updated last year
- IoT Camera Reconnaissance and Live Viewer☆178Jul 30, 2024Updated last year
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆45Mar 8, 2024Updated last year
- Work, timer, and wait callback example using solely Native Windows APIs.☆88Feb 11, 2024Updated 2 years ago
- Inject DLLs into the explorer process using icons☆408May 18, 2025Updated 9 months ago
- Reverse shell that can bypass windows defender detection☆170Feb 3, 2024Updated 2 years ago
- Stega Shade CLI is a user-friendly command-line interface tool designed for image-based steganography. With a focus on simplicity and sec…☆42Jul 19, 2025Updated 7 months ago
- TempMail is a simple web application that allows you to generate temporary email addresses and view the emails received by these addresse…☆98Feb 8, 2026Updated 3 weeks ago
- OSINT tool to crawl a site and extract useful recon info.☆459Aug 13, 2025Updated 6 months ago
- A Python script that anonymizes an Excel file and synthesizes new data in its place.☆84Sep 25, 2025Updated 5 months ago
- IOCs and detection script for COATHANGER malware☆55Feb 7, 2024Updated 2 years ago
- Small toolkit for extracting information and dumping sensitive strings from Windows processes☆117Jul 17, 2024Updated last year
- An Android app with the only goal of being a secure, locked, no-third party, completely local open source password saving app☆34May 12, 2025Updated 9 months ago
- Detect the state of your RBF.☆18Feb 16, 2024Updated 2 years ago
- Argus is used to test for Blind XSS and SSRF vulnerbilities or any sort of OOB detection☆13Nov 1, 2024Updated last year
- A POC to disable TamperProtection and other Defender / MDE components☆254Jun 6, 2024Updated last year
- Leak NTLM via Website tab in teams via MS Office☆78Mar 28, 2024Updated last year
- Collection of forensic tools☆693Jan 12, 2026Updated last month
- Modern web-based distributed hashcracking solution, built on hashcat☆189Updated this week
- The best Meta Search engine running on simple PHP servers or localhosts that keeps privacy and ease of use in mind!☆131Dec 3, 2025Updated 3 months ago
- Enumerate SSN (System Service Numbers or Syscall ID) and syscall instruction address in ntdll module by parsing the PEB of the current pr…☆21Jan 28, 2024Updated 2 years ago
- ☆85May 15, 2025Updated 9 months ago
- Docker Remote API Scanner and Exploit☆180Nov 13, 2023Updated 2 years ago
- ☆12Feb 4, 2025Updated last year
- ☆35Dec 6, 2023Updated 2 years ago
- CIA UAC bypass implementation of Stinger that obtains the token from an auto-elevated process, modifies it, and reuses it to execute as A…☆301Feb 2, 2026Updated last month
- Analyse MSI files for vulnerabilities☆142Aug 30, 2024Updated last year
- Simple and secure secret sharing in the browser☆50Mar 30, 2025Updated 11 months ago
- Modify managed functions from unmanaged code☆53Feb 1, 2024Updated 2 years ago
- C# tool to identify and exploit weaknesses within MSSQL instances in Active Directory environments☆113Feb 13, 2022Updated 4 years ago