Python program to steganography files into images using the Least Significant Bit.
☆951Aug 11, 2022Updated 3 years ago
Alternatives and similar repositories for LSB-Steganography
Users that are interested in LSB-Steganography are comparing it to the libraries listed below
Sorting:
- LSB steganography and detection☆628Aug 7, 2020Updated 5 years ago
- Least Significant Bit Steganography for bitmap images (.bmp and .png), WAV sound files, and byte sequences. Simple LSB Steganalysis (LSB …☆646Oct 10, 2025Updated 4 months ago
- Steganography: Hiding an image inside another☆364Feb 11, 2026Updated 3 weeks ago
- A pure Python steganography module.☆585Feb 14, 2026Updated 2 weeks ago
- Least-Significant-Bit tool for steganography☆79Jun 21, 2018Updated 7 years ago
- Collection of steganography tools - helps with CTF challenges☆2,640Nov 27, 2022Updated 3 years ago
- detect stegano-hidden data in PNG & BMP☆1,539Jan 28, 2026Updated last month
- A steganalysis tool for detecting LSB steganography in images☆234Aug 14, 2018Updated 7 years ago
- A basic example of how to use Least Significant Bit steganography on a BMP image☆15Mar 16, 2023Updated 2 years ago
- CloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based S…☆1,651Nov 24, 2020Updated 5 years ago
- Linux ELF x32/x64 ASLR DEP/NX bypass exploit with stack-spraying☆303Jan 12, 2023Updated 3 years ago
- Some setup scripts for security research tools.☆9,311Updated this week
- UNMAINTAINED. USE AT OWN RISK. Stegdetect is an automated tool for detecting steganographic content in images.☆422Oct 31, 2018Updated 7 years ago
- OpenStego is a steganography application that provides two functionalities: a) Data Hiding: It can hide any data within an image file. b)…☆1,362Aug 12, 2023Updated 2 years ago
- Yet another Stego Tool☆401Jul 3, 2023Updated 2 years ago
- WhiteBox CMS analysis☆69May 22, 2023Updated 2 years ago
- Working with numbers (primes, modular, etc.)☆246Jul 15, 2022Updated 3 years ago
- Express security essentials deployment for Linux Servers☆60Oct 19, 2020Updated 5 years ago
- Python steganography tool to hide images or text in images☆439Nov 9, 2019Updated 6 years ago
- Encrypted exploit delivery for the masses☆270Sep 25, 2019Updated 6 years ago
- Implementation of LSB Steganography technique in Python 3. It also includes a GUI implementation.☆13May 25, 2020Updated 5 years ago
- Steganography brute-force utility to uncover hidden data inside files☆591Dec 25, 2020Updated 5 years ago
- CTF framework and exploit development library☆13,293Updated this week
- Implementation Hide Text In Image with encryption☆46Jan 31, 2020Updated 6 years ago
- Ctf solutions from p4 team☆1,836Sep 18, 2024Updated last year
- A shellcode testing harness.☆70Jul 10, 2024Updated last year
- GUI tool to create ROP chains using the ropper API☆159Mar 30, 2018Updated 7 years ago
- Nili is a Tool for Network Scan, Man in the Middle, Protocol Reverse Engineering and Fuzzing.☆217Oct 23, 2019Updated 6 years ago
- Blaze Telegram Backdoor Toolkit is a post-exploitation tool that leverages the infrastructure of Telegram as a C&C☆206Sep 6, 2018Updated 7 years ago
- Enumerate usernames on a domain where you have no creds by using SMB Relay with low priv.☆399May 20, 2020Updated 5 years ago
- Wiki-like CTF write-ups repository, maintained by the community. 2015☆2,000Aug 27, 2022Updated 3 years ago
- Hiding Images within other images using Deep Learning☆211Apr 25, 2018Updated 7 years ago
- Evilgrade is a modular framework that allows the user to take advantage of poor upgrade implementations by injecting fake updates.☆1,322Sep 1, 2021Updated 4 years ago
- ☆524Aug 11, 2023Updated 2 years ago
- A tool to analyze multi-byte xor cipher☆1,477May 21, 2025Updated 9 months ago
- A framework for Backdoor development!☆434Mar 18, 2018Updated 7 years ago
- A PoC backdoor that uses Gmail as a C&C server☆1,348Nov 16, 2018Updated 7 years ago
- PowerShell Runspace Post Exploitation Toolkit☆1,548Aug 2, 2019Updated 6 years ago
- Simple steganography program based on the LSB method.☆127Jun 2, 2023Updated 2 years ago