Very simple frequency domain(FFT based) image steganography/waterprint/signature. https://www.zhihu.com/question/50735753/answer/122593277
☆24Jun 9, 2020Updated 5 years ago
Alternatives and similar repositories for FdSig
Users that are interested in FdSig are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Final year undergraduate project - embedding secret messages into a live video stream, transmitting the stream, and extracting the messag…☆12Mar 27, 2017Updated 9 years ago
- This is a opensource repo about how to detect android malware using Random Forest Classifier and explain it use linearsvc.☆12Feb 7, 2024Updated 2 years ago
- Hide files and data in plain ascii text that is invisible to the naked eye☆18Feb 10, 2015Updated 11 years ago
- Dumping LSA secrets: a story about task decorrelation☆14Jul 9, 2024Updated last year
- Image Steganography using QR-codes written in Python 3.7.☆12Mar 13, 2021Updated 5 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- A steganography based shellcode hider to bypass AV☆17Aug 7, 2022Updated 3 years ago
- ☆10Sep 24, 2021Updated 4 years ago
- My challenges for AIS3 pre-exam 2019 and MyFirstCTF 2019☆21Jun 16, 2019Updated 6 years ago
- A collection of tools that deal with crypto and cryptanalysis. For educational purposes only. These tools are likely not a good substitut…☆24May 30, 2018Updated 7 years ago
- Offensive tool for Active Directory reconnaissance☆12Jan 28, 2026Updated 3 months ago
- 📡 Ease file sharing during pentest/CTF 🎸☆11Apr 20, 2026Updated 2 weeks ago
- ☆15Mar 2, 2014Updated 12 years ago
- digital image steganography using BPCS (Bit-Plane Complexity Segmentation Steganography)☆32Aug 15, 2024Updated last year
- Under Your Radar (UYR): Exfiltration using Steganography☆18Mar 28, 2015Updated 11 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Euli is not a computer game but a tool which helps you set up a real life treasure hunt☆44Feb 6, 2021Updated 5 years ago
- Data exfiltration using covert channels in the TCP/IP protocol with some basic steganography.☆12Apr 19, 2017Updated 9 years ago
- A small python app to embed "secret" user data into a carrier image by manipulation of the Discrete Cosine Transform (DCT) AC coefficient…☆38Sep 19, 2024Updated last year
- StegsnowBruteForcer — outil Python pour brute-force de mots de passe dans les documents.☆15Feb 17, 2026Updated 2 months ago
- The setup being used for mobile exploitation in the TCP1P CTF 2023☆13Nov 17, 2023Updated 2 years ago
- transmit cs beacon (shellcode) over self-made dns to avoid anti-kill and AV☆50Jan 19, 2021Updated 5 years ago
- ☆16May 26, 2021Updated 4 years ago
- Cross-machine AI agent communication, plus a mobile app to control any terminal on your machine.☆97Updated this week
- Splicing image forgery detection based on DCT and Local Binary Pattern☆10Apr 30, 2020Updated 6 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Some Snippets for Frida☆15Feb 27, 2021Updated 5 years ago
- A modular framework and program for synchronous pwning with ssh, powered by Python 3, for educational and controlled penetration testing…☆10Sep 4, 2016Updated 9 years ago
- Get a temporary identity with a temporary email address, name, and phone number.☆12Apr 23, 2022Updated 4 years ago
- Steganography( LSB IMAGES ) using AES Cryptography together☆13Nov 7, 2014Updated 11 years ago
- Helps you saving your mail attachments (e.g. epub-files, PDFs) to a temporary directory, convert the files to MOBI-format and send them d…☆14Feb 24, 2019Updated 7 years ago
- Proof of concept about a path traversal vulnerability in Microsoft's Diagcab technology that could lead to remote code execution☆23Jun 16, 2022Updated 3 years ago
- Steganography in Twitter using retweets☆12Jun 19, 2022Updated 3 years ago
- CryDecryptor is an Android application to decrypt files from device compromised by the CryCryptor ransomware☆15Jul 2, 2020Updated 5 years ago
- Image Processing and feature detection are the two most important areas of research in Computer Vision. In our one year project we succes…☆12Jul 26, 2017Updated 8 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- CCycles: a C API for the renderer Cycles. CSycles: a C# wrapper around CCycles.☆11Apr 30, 2026Updated last week
- This Project Describes the use of LSB Steganography, with a python program added to further implement it. I havn't writtent the algorithm…☆12Dec 9, 2020Updated 5 years ago
- draw a Pokemon Eevee via CSS 使用CSS画一个😍伊布,每个都可以领养☆10Mar 6, 2021Updated 5 years ago
- Google CVE related code☆15Jul 20, 2023Updated 2 years ago
- Quadruped Robot Dogs + ROS & Gelblasters == Dystopian Future "Fox" Hunt☆11Sep 28, 2023Updated 2 years ago
- A pattern based Dalvik deobfuscator which uses limited execution to improve semantic analysis☆13Mar 22, 2022Updated 4 years ago
- Hide text informations using invisible text characters☆12Apr 4, 2022Updated 4 years ago