 stegseek
 stegseek 
 Steghide cracker
 A tool designed to crack and extract hidden data from encrypted files using brute-force techniques.
 Worlds fastest steghide cracker, chewing through millions of passwords per second
 Worlds fastest steghide cracker, chewing through millions of passwords per second 
1k stars
 17 watching
 112 forks
 
Language: C++ 
last commit: about 2 years ago   brute-forcecrackingctfctf-toolspentestingsecuritysteganographystegcrackersteghidestego 
 Related projects:
| Repository | Description | Stars | 
|---|---|---|
|  | Detects hidden data in images using various steganography techniques | 1,333 | 
|  | A tool for hiding files within images using Least Significant Bit steganography | 1,210 | 
|  | A tool for cracking passwords from various file types using dictionary search and brute force methods | 425 | 
|  | A tool for brute-forcing Bitcoin private keys | 769 | 
|  | A steganographic tool for encoding and decoding data in various formats | 266 | 
|  | A tool for hiding information in binary executables without altering their size or execution speed | 292 | 
|  | Tools and scripts for cracking custom network authentication systems | 402 | 
|  | A utility for automatically generating and sending multiple payload variations to test GraphQL APIs' strength against common attacks such as brute-forcing, password spraying, and fuzzing. | 318 | 
|  | A tool for hiding data in plain sight by transforming it into innocuous-looking strings | 1,566 | 
|  | A password cracking tool for BitLocker-encrypted storage devices using GPU-accelerated algorithms | 833 | 
|  | A password cracking tool using Markov chains to generate linguistically plausible candidates | 62 | 
|  | A comprehensive cryptographic framework for Swift, providing tools and functions for RSA public/private key generation, AES encryption/decryption, signature verification, elliptic curve cryptography, Diffie-Hellman protocol, and symmetric and authenticating ciphers. | 723 | 
|  | A tool for cracking PDF passwords using various methods such as dictionary attacks and brute-forcing | 701 | 
|  | Automates the process of trying all possible combinations of service credentials on a target system to gain unauthorized access. | 1,990 | 
|  | Automates brute force attempts on network devices using SNMP protocol | 298 |