This is a Python module which facilitates text hiding in an image, using the LSB technique. It was made using Python 3.4.2 and the PIL image processing library. It works with JPEG and PNG formats for the cover image and always creates PNG stego image due to its lossless compression.
☆10Aug 22, 2019Updated 6 years ago
Alternatives and similar repositories for LSB-steganography
Users that are interested in LSB-steganography are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- 基于LSB隐写术将文本隐藏于320x240的灰度图像☆21Nov 23, 2019Updated 6 years ago
- A Python script for extracting encoded text from PNG images☆17Oct 28, 2021Updated 4 years ago
- Saratov State University, CSIT. Discipline "cryptographic methods of information security" (криптографические методы защиты информации, r…☆15Jun 28, 2018Updated 7 years ago
- scripts to create zip bombs☆12Nov 26, 2012Updated 13 years ago
- School Assignment☆32Oct 31, 2020Updated 5 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Data exfiltration using covert channels in the TCP/IP protocol with some basic steganography.☆12Apr 19, 2017Updated 9 years ago
- StegsnowBruteForcer — outil Python pour brute-force de mots de passe dans les documents.☆15Feb 17, 2026Updated 2 months ago
- Final year undergraduate project - embedding secret messages into a live video stream, transmitting the stream, and extracting the messag…☆12Mar 27, 2017Updated 9 years ago
- PaaS platforms like Cloud Foundry, container orchestrators like Kubernetes, Serverless platforms like OpenWhisk and Service-mesh like Ist…☆15Feb 17, 2022Updated 4 years ago
- Peap Bomb is a password sprayer for WPA/WPA2 enterprise wireless that is leveraging PEAP for Authentication.☆10Feb 18, 2021Updated 5 years ago
- A modular framework and program for synchronous pwning with ssh, powered by Python 3, for educational and controlled penetration testing…☆10Sep 4, 2016Updated 9 years ago
- ☆56Nov 20, 2020Updated 5 years ago
- Get a temporary identity with a temporary email address, name, and phone number.☆12Apr 23, 2022Updated 4 years ago
- 🤘🤘🤘SMS BOMB FOR BANGLADESH(BD),INDIA,PAKISTAN,UK,MALAYSIA,ISREAL,PALEASTINE,🤘🤘🤘☆18Jun 5, 2021Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Steganography( LSB IMAGES ) using AES Cryptography together☆13Nov 7, 2014Updated 11 years ago
- Helps you saving your mail attachments (e.g. epub-files, PDFs) to a temporary directory, convert the files to MOBI-format and send them d…☆14Feb 24, 2019Updated 7 years ago
- Stores email header and body information in JSON format☆12Mar 10, 2016Updated 10 years ago
- Steganography in Twitter using retweets☆12Jun 19, 2022Updated 3 years ago
- 📧A disposable email client built with Flask. Need a temporary email? Look no further!☆16Sep 12, 2018Updated 7 years ago
- An image steganography with high embedding capacity based on a genetic algorithm☆11Nov 9, 2019Updated 6 years ago
- Data Hiding in Image☆10Apr 9, 2020Updated 6 years ago
- The encrypted steganography filesystem☆42Jan 12, 2011Updated 15 years ago
- A python tool for sms bombing only Robi and Airtel numbers.☆13Feb 24, 2025Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- A python script for digital image steganography using Fast Fourier Transform.☆11Aug 30, 2024Updated last year
- bitcoin steganography library☆10Nov 22, 2015Updated 10 years ago
- This is bombing tool☆16Dec 1, 2023Updated 2 years ago
- An interactive implementation of (parts of) the "Bomb Defusal Manual" from the game "Keep Talking and Nobody Explodes"☆13Dec 10, 2015Updated 10 years ago
- Video Steganography for Piracy Prevention☆12Oct 16, 2016Updated 9 years ago
- Temporary Email Service Within Terminal☆11Aug 4, 2020Updated 5 years ago
- Solutions to CTF problems.☆11May 29, 2016Updated 9 years ago
- Collection of things I've written on pentests to make life easier.☆16Mar 14, 2019Updated 7 years ago
- Linux kernel level keylogger that uses Twitter as a covert channel to get information of keystrokes and user data into the attacker using…☆11Jan 20, 2023Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Hide data in plaintext☆16Mar 25, 2019Updated 7 years ago
- - Anonymous E-Mail sending. - E-Mail bombing without logging in. - Sms bombing by victim no.☆10Oct 21, 2023Updated 2 years ago
- Joint adjustment image steganography networks☆10Aug 3, 2023Updated 2 years ago
- Writeups for Google CTF challenges 2017☆10Jun 19, 2017Updated 8 years ago
- In Attempt to solve Cicada 3301 Puzzle by myself☆15Aug 6, 2018Updated 7 years ago
- My latest setup configs.☆10Aug 7, 2016Updated 9 years ago
- An effective menu driven GUI made using Tkinter which takes in an image and returns a new image with the text data encoded in the pixels.☆10Oct 3, 2023Updated 2 years ago