TapanSoni / BPSteganoView external linksLinks
BPStegano is a steganography tool built using Python 3. It uses AES-128 encryption a custom LSB random pixel algorithm hiding to hide raw strings and any type of file inside images.
☆26Feb 22, 2021Updated 4 years ago
Alternatives and similar repositories for BPStegano
Users that are interested in BPStegano are comparing it to the libraries listed below
Sorting:
- little helping scripts that I use daily☆11Aug 30, 2021Updated 4 years ago
- Saratov State University, CSIT. Discipline "cryptographic methods of information security" (криптографические методы защиты информации, r…☆15Jun 28, 2018Updated 7 years ago
- A python tool for sms bombing only Robi and Airtel numbers.☆13Feb 24, 2025Updated 11 months ago
- 🤘🤘🤘SMS BOMB FOR BANGLADESH(BD),INDIA,PAKISTAN,UK,MALAYSIA,ISREAL,PALEASTINE,🤘🤘🤘☆17Jun 5, 2021Updated 4 years ago
- Data Hiding in Image☆10Apr 9, 2020Updated 5 years ago
- 📧A disposable email client built with Flask. Need a temporary email? Look no further!☆16Sep 12, 2018Updated 7 years ago
- This Project Describes the use of LSB Steganography, with a python program added to further implement it. I havn't writtent the algorithm…☆12Dec 9, 2020Updated 5 years ago
- 利用Python编写的微信消息轰炸脚本☆10Mar 19, 2021Updated 4 years ago
- Challenges for the TheManyHatsClub CTF☆11May 1, 2023Updated 2 years ago
- scripts to create zip bombs☆12Nov 26, 2012Updated 13 years ago
- Joint adjustment image steganography networks☆10Aug 3, 2023Updated 2 years ago
- Video Steganography for Piracy Prevention☆12Oct 16, 2016Updated 9 years ago
- 💣СМС Бомбер от команды HZF💣☆13Feb 21, 2024Updated last year
- Python Steganography data hiding in image☆10Dec 25, 2021Updated 4 years ago
- A keylogger that sends emails with log attachment - works on all OS☆11Oct 30, 2021Updated 4 years ago
- Automating the boring stego work for you..☆13Feb 26, 2019Updated 6 years ago
- Moonton Dump + Checker Email Password☆20Jul 18, 2021Updated 4 years ago
- Viruses for the public to test.☆10Aug 11, 2018Updated 7 years ago
- Final year undergraduate project - embedding secret messages into a live video stream, transmitting the stream, and extracting the messag…☆12Mar 27, 2017Updated 8 years ago
- In Attempt to solve Cicada 3301 Puzzle by myself☆15Aug 6, 2018Updated 7 years ago
- - Anonymous E-Mail sending. - E-Mail bombing without logging in. - Sms bombing by victim no.☆10Oct 21, 2023Updated 2 years ago
- Solutions/Challenge files for encore☆13Jan 9, 2026Updated last month
- bugBounty Scripts☆11Feb 3, 2023Updated 3 years ago
- Basic steganography using python by injecting extra bytes after image file☆15Dec 16, 2023Updated 2 years ago
- Tutorial to create a bootable Kali USB drive with persistent storage.☆10May 23, 2017Updated 8 years ago
- Linux kernel level keylogger that uses Twitter as a covert channel to get information of keystrokes and user data into the attacker using…☆11Jan 20, 2023Updated 3 years ago
- Reverse Shell troll software☆12Sep 24, 2019Updated 6 years ago
- Analyze, tweak and extract morse code from audio files.☆12Aug 25, 2022Updated 3 years ago
- A full-fledged msfrpc library for Metasploit framework.☆13Aug 5, 2017Updated 8 years ago
- ☆15Mar 2, 2014Updated 11 years ago
- Tool to remove personal information from body and headers of an email message (anonymization)☆14Dec 12, 2016Updated 9 years ago
- An effective menu driven GUI made using Tkinter which takes in an image and returns a new image with the text data encoded in the pixels.☆10Oct 3, 2023Updated 2 years ago
- A python script for digital image steganography using Fast Fourier Transform.☆11Aug 30, 2024Updated last year
- My implementation of y-DCGAN,which can automatically learn embedding change probability for digital images.☆10Mar 25, 2018Updated 7 years ago
- ☆12Apr 20, 2017Updated 8 years ago
- Implementation of LSB Steganography technique in Python 3. It also includes a GUI implementation.☆13May 25, 2020Updated 5 years ago
- Solutions to CTF problems.☆11May 29, 2016Updated 9 years ago
- Deep Steganalysis training script☆12May 1, 2025Updated 9 months ago
- Under Your Radar (UYR): Exfiltration using Steganography☆18Mar 28, 2015Updated 10 years ago