MidoriYakumo / FdSigLinks
Very simple frequency domain(FFT based) image steganography/waterprint/signature. https://www.zhihu.com/question/50735753/answer/122593277
☆23Updated 5 years ago
Alternatives and similar repositories for FdSig
Users that are interested in FdSig are comparing it to the libraries listed below
Sorting:
- Least-Significant-Bit tool for steganography☆81Updated 7 years ago
- ☆11Updated 3 years ago
- Hard-to-detect image steganography☆45Updated 7 months ago
- Stego Helper Identification Tool☆27Updated 6 years ago
- volatility explorer☆92Updated 4 years ago
- A steganalysis tool for detecting LSB steganography in images☆223Updated 7 years ago
- An archive of descrypt hashes for common non-personal passwords☆38Updated 2 months ago
- jphide & seek steganography tools☆87Updated 7 years ago
- Detection and sanitization for Acropalypse Now - CVE-2023-21036☆81Updated 2 years ago
- PoCs for CVE-2020-11108; an RCE and priv esc in Pi-hole☆27Updated 5 years ago
- A list of attacks or malware using steganography or information hiding☆67Updated last year
- Embeds messages into images using the Least Significant Bit algorithm☆11Updated 2 years ago
- Linked Pixel Steganography (LPS) technique is a variant of the well-known LSB steganography. It can be applied to any type of images.☆18Updated 2 years ago
- GUI for Volatility forensics tool written in PyQT5☆60Updated 4 years ago
- A list of covert channels and steganography/steganalysis resources (books, papers & tools)☆102Updated 3 years ago
- Use md5-collisions to make evil executables looking like a good one.☆30Updated 5 years ago
- Simple steganography program based on the LSB method.☆126Updated 2 years ago
- tunnel port to port traffic over an obfuscated channel with AES-GCM encryption.☆69Updated 5 years ago
- An open-source toolbox for steganalysis☆180Updated 2 months ago
- A minimal DNS service that can provide spoofed replies☆103Updated 2 years ago
- Volatility Explorer Suit☆66Updated 2 years ago
- ☆24Updated 3 years ago
- Crypto projects in python, e.g. Attacks to Vigenere, RSA, Telnet Protocol, Hip Replacement , Vernam cipher, Crack Zip Files, Encryptions…☆21Updated 2 years ago
- MD5 collision testing☆17Updated 9 months ago
- Fork of aeskeyfind that knows more formats of AES key schedule☆65Updated 8 years ago
- My CTF write-ups☆28Updated 3 years ago
- A flexible steganography library supporting various file types and steganalysis☆14Updated 2 months ago
- Tool for finding Buffer Overflows in simple binaries. CTF use mainly.☆20Updated 7 years ago
- This tool will listen on a given port, strip SSL encryption, forward traffic through a plain TCP proxy, then encrypt the returning traffi…☆32Updated 3 years ago
- A steganography based shellcode hider to bypass AV☆17Updated 3 years ago