MidoriYakumo / FdSigLinks
Very simple frequency domain(FFT based) image steganography/waterprint/signature. https://www.zhihu.com/question/50735753/answer/122593277
☆23Updated 5 years ago
Alternatives and similar repositories for FdSig
Users that are interested in FdSig are comparing it to the libraries listed below
Sorting:
- ☆34Updated 2 years ago
- A steganalysis tool for detecting LSB steganography in images☆230Updated 7 years ago
- Hard-to-detect image steganography☆46Updated 11 months ago
- An archive of descrypt hashes for common non-personal passwords☆40Updated 6 months ago
- Linked Pixel Steganography (LPS) technique is a variant of the well-known LSB steganography. It can be applied to any type of images.☆19Updated 2 years ago
- Fork of aeskeyfind that knows more formats of AES key schedule☆67Updated 8 years ago
- Least-Significant-Bit tool for steganography☆79Updated 7 years ago
- Advance Image Steganography☆132Updated 3 years ago
- A list of covert channels and steganography/steganalysis resources (books, papers & tools)☆100Updated 3 years ago
- volatility explorer☆92Updated 5 years ago
- PoC for hiding data within $MFT☆12Updated 11 years ago
- Steganography algorithms implemented in C++ with OpenCV.☆42Updated 4 years ago
- Toolkit for Filesystem based Data Hiding Techniques.☆39Updated 6 years ago
- Attempts to reverse a given partial hash to a phone number (or email) given the area code. Written for python3.☆20Updated 3 years ago
- ☆16Updated 4 years ago
- ☆26Updated 3 years ago
- digital image steganography using BPCS (Bit-Plane Complexity Segmentation Steganography)☆30Updated last year
- Sample of the wanna cry ransomware.☆32Updated 8 years ago
- A Python script for extracting encoded text from PNG images☆17Updated 4 years ago
- kunkillable is an LKM that makes userland processes unkillable.☆16Updated 5 years ago
- SteCoSteg is OutGuess successor and Vernam cipher analog in steganography.☆56Updated 6 years ago
- A steganography based shellcode hider to bypass AV☆17Updated 3 years ago
- Compare efficiency of steganographic processes LSB,DCT and DWT☆61Updated 5 years ago
- A minimal DNS service that can provide spoofed replies☆102Updated 2 years ago
- Volatility plugin to extract BitLocker Full Volume Encryption Keys (FVEK)☆70Updated 4 years ago
- PoC - Exploit Delivery via Steganography and Polyglots, CVE-2014-0282☆53Updated last year
- This repo contains miscellaneous tools to aid in your malware analysis.☆13Updated 4 years ago
- Detection and sanitization for Acropalypse Now - CVE-2023-21036☆81Updated 2 years ago
- Fork of rsakeyfind☆21Updated 8 years ago
- ☆68Updated 4 years ago