HiddenWaveHide Your Secret Message in any Wave Audio File.
Stars: ✭ 97 (+110.87%)
Hidden-EyeHide data into Picture
Stars: ✭ 39 (-15.22%)
BrambleBramble is a hacking Open source suite.
Stars: ✭ 60 (+30.43%)
CloakifyCloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based Steganography; Evade DLP/MLS Devices, Defeat Data Whitelisting Controls, Social Engineering of Analysts, Evade AV Detection
Stars: ✭ 1,136 (+2369.57%)
StegcloakHide secrets with invisible characters in plain text securely using passwords 🧙🏻♂️⭐
Stars: ✭ 2,379 (+5071.74%)
gif-msgHide 127 bytes in a gif without touching any pixels or colors
Stars: ✭ 26 (-43.48%)
StegXSteganography (BMP, PNG, WAV, MP3, AVI, FLV)
Stars: ✭ 22 (-52.17%)
pixcryption📷 Pixel Safe Encryption - Now Cryptographically Secure 🔒
Stars: ✭ 56 (+21.74%)
Image-SteganoAnalysis and Implementation of Image Steganography methods using Java
Stars: ✭ 19 (-58.7%)
hide-meMac and hostname random changer
Stars: ✭ 33 (-28.26%)
steganographyA simple steganography library written in rust
Stars: ✭ 75 (+63.04%)
anubisCaptive wifi hotspot bypass tool for Linux
Stars: ✭ 46 (+0%)
Foxss-XSS-Penetration-Testing-ToolFoxss is a simple php based penetration Testing Tool.Currently it will help to find XSS vulnerability in websites.
Stars: ✭ 35 (-23.91%)
busysteg👻 Hide information content into busy areas of images, optimally
Stars: ✭ 62 (+34.78%)
awesome-pentest-toolsList of Security Archives Tools and software, generally for facilitate security & penetration research. Opening it up to everyone will facilitate a knowledge transfer. Hopefully the initial set will grow and expand.
Stars: ✭ 34 (-26.09%)
CVE-2020-5902exploit code for F5-Big-IP (CVE-2020-5902)
Stars: ✭ 37 (-19.57%)
AttackSurfaceManagementDiscover the attack surface and prioritize risks with our continuous Attack Surface Management (ASM) platform - Sn1per Professional #pentest #redteam #bugbounty
Stars: ✭ 45 (-2.17%)
SneakyEXEEmbedding a "UAC-Bypassing" function into your custom payload
Stars: ✭ 95 (+106.52%)
GetPwdIt's a tool which generate a dictionary from a csv containing personals informations. Generate all common passwords based on perso info. (leet transformations and combinatory processing)
Stars: ✭ 46 (+0%)
InfectCreate you virus in termux!
Stars: ✭ 33 (-28.26%)
fluxionWiFi Cracking Tool (Using Evil Twin Attack) With Some Modification. (Only For Legal Purposes)
Stars: ✭ 115 (+150%)
TokenBreakerJSON RSA to HMAC and None Algorithm Vulnerability POC
Stars: ✭ 51 (+10.87%)
Jasmin-RansomwareJasmin Ransomware is an advanced red team tool (WannaCry Clone) used for simulating real ransomware attacks. Jasmin helps security researchers to overcome the risk of external attacks.
Stars: ✭ 84 (+82.61%)
wifite2-requirementsThis bash script will install wifite2 and its other tools Pyrit, bully, wireshark, hcxtools, hcxdumptool, macchanger
Stars: ✭ 20 (-56.52%)
AperiSolveSteganalysis web platform
Stars: ✭ 268 (+482.61%)
sudohulktry privilege escalation changing sudo command
Stars: ✭ 114 (+147.83%)
droid controllerControl the parameters of an Android system with the power of Xposed framework. 通过Xposed框架控制Android参数。
Stars: ✭ 15 (-67.39%)
JARJust Another Repo
Stars: ✭ 53 (+15.22%)
TORhunterDesigned to scan and exploit vulnerabilities within Tor hidden services. TORhunter allows most tools to work as normal while resolving .onion
Stars: ✭ 47 (+2.17%)
nero-phishing-serverAn full HTTP server for Phishing. Downloads recursively the entire webpage.
Stars: ✭ 108 (+134.78%)
PhirauteeA proof of concept crypto virus to spread user awareness about attacks and implications of ransomwares. Phirautee is written purely using PowerShell and does not require any third-party libraries. This tool steals the information, holds an organisation’s data to hostage for payments or permanently encrypts/deletes the organisation data.
Stars: ✭ 96 (+108.7%)
SCANNER-INURLBRAdvanced search in search engines, enables analysis provided to exploit GET / POST capturing emails & urls, with an internal custom validation junction for each target / url found.
Stars: ✭ 90 (+95.65%)
trjExecute any command in other's computer using a trojan horse coded and compiled in C. Just for educational purpose.
Stars: ✭ 21 (-54.35%)
Red-Rabbit-V4The Red Rabbit project is just what a hacker needs for everyday automation. Red Rabbit unlike most frameworks out there does not automate other peoples tools like the aircrack suite or the wifite framework, it rather has its own code and is raw source with over 270+ options. This framework might just be your everyday key to your workflow
Stars: ✭ 123 (+167.39%)
VirusX5The Most Powerful Fake Page Redirecting tool...
Stars: ✭ 15 (-67.39%)
frontend-park哈喽大家好~我是荣顶!这是一个有趣的前端趣味知识公园~该项目是我平时捣鼓前端相关技术的一些案例集合。
Stars: ✭ 66 (+43.48%)
HashExploitHashExpoit is Great Tool For Cracking Hash
Stars: ✭ 17 (-63.04%)
ObsidianSailboatNmap and NSE command line wrapper in the style of Metasploit
Stars: ✭ 36 (-21.74%)
DomainkerBugBounty Tool
Stars: ✭ 40 (-13.04%)
MCPToolPentesting tool for Minecraft
Stars: ✭ 73 (+58.7%)
7uringAn advanced cryptography tool for hashing, encrypting, encoding, steganography and more.
Stars: ✭ 15 (-67.39%)
AshokAshok is a OSINT Recon Tool , a.k.a 😍 Swiss Army knife .
Stars: ✭ 109 (+136.96%)
paradoxiaRATParadoxiaRat : Native Windows Remote access Tool.
Stars: ✭ 583 (+1167.39%)
Hide-in-pngHide any file in a PNG Image
Stars: ✭ 17 (-63.04%)
KeyLyA powerfull and awesome Keylogger(Your keyboard and your mouse) realy helpfull for hackers! :-P (C/C++)
Stars: ✭ 17 (-63.04%)
deep-stegGlobal NIPS Paper Implementation Challenge of "Hiding Images in Plain Sight: Deep Steganography"
Stars: ✭ 43 (-6.52%)
IP-TrackerTrack any ip address with IP-Tracker. IP-Tracker is developed for Linux and Termux. you can retrieve any ip address information using IP-Tracker.
Stars: ✭ 53 (+15.22%)
natsA program to hide file into executable binary.
Stars: ✭ 16 (-65.22%)
OneShotRun WPS PIN attacks (Pixie Dust, online bruteforce, PIN prediction) without monitor mode with the wpa_supplicant
Stars: ✭ 223 (+384.78%)
BrutegramInstagram multi-bruteforce Platfrom
Stars: ✭ 183 (+297.83%)
fincherA steganography tool for text
Stars: ✭ 80 (+73.91%)
refluxionRefluxion -- MITM WPA attacks tool
Stars: ✭ 25 (-45.65%)
Pool2020💼 Pools organized for Epitech's students in 2020.
Stars: ✭ 14 (-69.57%)
HostEnumeratorA tool that automates the process of enumeration
Stars: ✭ 29 (-36.96%)
WPCrackerWordPress pentest tool
Stars: ✭ 34 (-26.09%)
SteganographyImage & video steganography in Matlab
Stars: ✭ 31 (-32.61%)