adrg / lsbstegLinks
Embeds messages into images using the Least Significant Bit algorithm
☆11Updated 2 years ago
Alternatives and similar repositories for lsbsteg
Users that are interested in lsbsteg are comparing it to the libraries listed below
Sorting:
- Fun exercises on image steganography in Python☆13Updated 7 years ago
- ☆15Updated 11 years ago
- SteCoSteg is OutGuess successor and Vernam cipher analog in steganography.☆56Updated 6 years ago
- Information Security using Steganography over Cryptography☆14Updated 9 months ago
- Linked Pixel Steganography (LPS) technique is a variant of the well-known LSB steganography. It can be applied to any type of images.☆18Updated 2 years ago
- A basic example of how to use Least Significant Bit steganography on a BMP image☆15Updated 2 years ago
- Zyklon H.T.T.P Remote Administration Tool - Control Panel leaked☆16Updated 8 years ago
- An image steganography with high embedding capacity based on a genetic algorithm☆11Updated 5 years ago
- against.py is a very fast ssh attacking script which includes a multithreaded port scanning module (tcp connect) for discovering possible…☆20Updated 9 years ago
- A python script for digital image steganography using Fast Fourier Transform.☆9Updated 9 months ago
- Exploit XXE Out-Of-Band Vulnerability Easily☆14Updated 8 years ago
- Personal notes and lab results pertaining to the text "Practical Malware Analysis" by Michael Sikorski and Andrew Honiq.☆12Updated 7 years ago
- Improvised LSB Steganography technique using Pixel Locator Sequence with AES. Implementation for paper https://ieeexplore.ieee.org/abstra…☆9Updated 4 years ago
- Implementation Hide Text In Image with encryption☆46Updated 5 years ago
- Find your router's default password☆14Updated 10 years ago
- python client/server keystroke logger☆21Updated 12 years ago
- Solutions to CTF problems.☆12Updated 9 years ago
- Steganography in Twitter using retweets☆11Updated 3 years ago
- Cgiemail - Source Code Disclosure/LFI☆15Updated 8 years ago
- A simple proxy scraper coded in Python.☆10Updated 8 years ago
- edge --> powerpoint --> remote-file --> shell☆12Updated 6 years ago
- NSA EquationGroup C&C Hunter using the Shodan API☆29Updated 9 years ago
- [Python] Google Scraper & Mass Exploiter☆29Updated 3 years ago
- Python library created while solving the Matasano Cryptopals challenges☆17Updated 4 years ago
- Metasploit python-payload obfuscation, to allow penetration testers bypass Antivirus solutions.☆29Updated 2 years ago
- ☆11Updated 7 years ago
- Malware.lu tools☆63Updated 11 years ago
- Steganography( LSB IMAGES ) using AES Cryptography together☆13Updated 10 years ago
- Saratov State University, CSIT. Discipline "cryptographic methods of information security" (криптографические методы защиты информации, r…☆15Updated 6 years ago
- This is a small and simple toolkit that might be useful during steganalysis, it is currently composed by several general purpose command …☆33Updated 5 years ago