Charleswyt / MP3StegoView external linksLinks
A forked opensource stego tool, primary URL: http://www.petitcolas.net/steganography/mp3stego/
☆11Dec 5, 2018Updated 7 years ago
Alternatives and similar repositories for MP3Stego
Users that are interested in MP3Stego are comparing it to the libraries listed below
Sorting:
- Binary or Hex to QR Code site☆13Aug 12, 2016Updated 9 years ago
- A steganography tool for embedding payloads within Python bytecode.☆155Dec 2, 2019Updated 6 years ago
- ☆10Jul 11, 2021Updated 4 years ago
- zsteg-python☆29Feb 12, 2023Updated 3 years ago
- Pseudo-Intel-CET functionality plugin based on QEMU 8.2.2 plugin system, with minor modifications to QEMU TCG body code to adapt to Glibc…☆14Jun 5, 2024Updated last year
- Linux kernel source tree☆10Oct 11, 2017Updated 8 years ago
- 鼠标键盘流量包取证☆93Jun 23, 2025Updated 7 months ago
- ☆15Aug 13, 2014Updated 11 years ago
- a port made of honey for blocking people☆13Jun 24, 2020Updated 5 years ago
- ACI-GetStarted☆11Jun 4, 2025Updated 8 months ago
- ☆10Dec 26, 2023Updated 2 years ago
- A PDF that shows its own MD5☆11Jan 2, 2023Updated 3 years ago
- Dev resources of Harmony☆15Mar 4, 2024Updated last year
- Fork of QEMU with Virtual Machine Introspection patches☆14Sep 13, 2023Updated 2 years ago
- A simple Mali 6xx/7xx register interface model that doesn't do any rendering.☆13Jan 29, 2016Updated 10 years ago
- Microbenchmarks for x86_64 kernel entry methods☆20Feb 21, 2022Updated 3 years ago
- For our ISSTA'23 paper ACETest: Automated Constraint Extraction for Testing Deep Learning Operators☆13Mar 30, 2024Updated last year
- Transform EQL detection rules to VQL artifacts☆12Nov 12, 2021Updated 4 years ago
- Integration fork of QEMU focusing on XNU platforms (arm, aarch64, etc)☆12Dec 12, 2022Updated 3 years ago
- ☆11Apr 2, 2022Updated 3 years ago
- A powershell script for creating a Windows honeyport.☆12Jun 24, 2015Updated 10 years ago
- The ICS^2 Matrix is a threat taxonomy for Programmable Logic Controllers and Industrial Control Systems☆13Sep 10, 2024Updated last year
- ☆21Feb 2, 2026Updated last week
- Fuzzing Secure Monitor Implementations☆19Aug 3, 2024Updated last year
- Shadow Attack, LiRA, Quantile Regression and RMIA implementations in PyTorch (Online version)☆14Nov 8, 2024Updated last year
- Tomcat PUT方法任意文件写入(CVE-2017-12615)exp☆11Mar 14, 2023Updated 2 years ago
- wannabe (up-to-date) 64bit port of lguest☆14May 11, 2011Updated 14 years ago
- ☆12Apr 1, 2025Updated 10 months ago
- 最新漏洞收集、复现、漏洞环境☆10Mar 21, 2019Updated 6 years ago
- ☆11Aug 10, 2021Updated 4 years ago
- ☆13Aug 31, 2024Updated last year
- ☆10Jun 11, 2018Updated 7 years ago
- LinuxShell编程笔记☆15Aug 29, 2017Updated 8 years ago
- Random scripts for azure stuff☆13Oct 12, 2022Updated 3 years ago
- icml24☆14Feb 24, 2025Updated 11 months ago
- ☆10Jan 3, 2023Updated 3 years ago
- ☆14Jan 5, 2024Updated 2 years ago
- Command-line tool to format and syntax highlight Suricata rules☆13Nov 30, 2019Updated 6 years ago
- Scalability-First Pointer Analysis with Self-Tuning Context-Sensitivity☆11Jul 2, 2023Updated 2 years ago