MidoriYakumo / FdSigLinks
Very simple frequency domain(FFT based) image steganography/waterprint/signature. https://www.zhihu.com/question/50735753/answer/122593277
☆23Updated 5 years ago
Alternatives and similar repositories for FdSig
Users that are interested in FdSig are comparing it to the libraries listed below
Sorting:
- An archive of descrypt hashes for common non-personal passwords☆40Updated 5 months ago
- PoC - Exploit Delivery via Steganography and Polyglots, CVE-2014-0282☆53Updated last year
- CVE-2022-0847: Linux Kernel Privilege Escalation Vulnerability☆21Updated 3 years ago
- Exploit development and reversing of Hichip's P2P camera firmware☆37Updated 4 years ago
- Least-Significant-Bit tool for steganography☆79Updated 7 years ago
- Linked Pixel Steganography (LPS) technique is a variant of the well-known LSB steganography. It can be applied to any type of images.☆19Updated 2 years ago
- volatility explorer☆92Updated 5 years ago
- A flexible steganography library supporting various file types and steganalysis☆14Updated 4 months ago
- Machine-learn password mangling rules☆114Updated 2 years ago
- A payload delivery system which embeds payloads in an executable's icon file!☆74Updated last year
- A privilege escalation vulnerability exists in Windows due to a flaw in the implementation of the Atom Table. An attacker could exploit t…☆29Updated last year
- Detection and sanitization for Acropalypse Now - CVE-2023-21036☆82Updated 2 years ago
- Advance Image Steganography☆132Updated 3 years ago
- A steganography based shellcode hider to bypass AV☆17Updated 3 years ago
- rShellZ s a linux reverse-shell & exploitation assistance framework. With lots of payload and post exploitation modules.☆14Updated 2 years ago
- A new web frontend for Hashtopolis☆39Updated this week
- A tool capable of bypassing easy root detection mechanisms by patching applications automatically (without frida).☆33Updated last year
- VBScript minifier☆25Updated 10 months ago
- Peap Bomb is a password sprayer for WPA/WPA2 enterprise wireless that is leveraging PEAP for Authentication.☆10Updated 4 years ago
- PoC for hiding data within $MFT☆12Updated 11 years ago
- Ruby script to automate metasploit scanning, exploitation, and post-exploitation☆19Updated 5 years ago
- Manjaro LPE☆34Updated 2 years ago
- Use md5-collisions to make evil executables looking like a good one.☆33Updated 5 years ago
- This is a PoC for Nimbuspwn, a Linux privilege escalation issue identified by Microsoft☆25Updated 3 years ago
- Hard-to-detect image steganography☆45Updated 10 months ago
- A Python based backdoor that uses Steganography and a Cloud Image Service as a command and control server.☆26Updated 9 years ago
- A scanner that files with compromised or untrusted code signing certificates written in python.☆65Updated 2 years ago
- CVE-2023-38831 PoC (Proof Of Concept)☆88Updated last year
- ZTE F660 Routers Authentication Bypass Leading to RCE.☆19Updated last year
- ZIP cracker, CCRYPT cracker, and others to come.☆91Updated this week