adrg / lsbstegLinks
Embeds messages into images using the Least Significant Bit algorithm
☆11Updated 2 years ago
Alternatives and similar repositories for lsbsteg
Users that are interested in lsbsteg are comparing it to the libraries listed below
Sorting:
- Fun exercises on image steganography in Python☆13Updated 8 years ago
- SteCoSteg is OutGuess successor and Vernam cipher analog in steganography.☆56Updated 6 years ago
- HTTP Request Translator (hrt) translates raw HTTP requests to different scripts (bash, python, etc.)☆17Updated 8 years ago
- Least-Significant-Bit tool for steganography☆81Updated 7 years ago
- Solutions to CTF problems.☆12Updated 9 years ago
- Information Security using Steganography over Cryptography☆14Updated last year
- a python implement of f5 steganography☆47Updated 13 years ago
- scripts to create zip bombs☆12Updated 12 years ago
- A simple steganalysis script writen in Python☆26Updated 11 years ago
- ☆15Updated 11 years ago
- Automating the boring stego work for you..☆15Updated 6 years ago
- Security Tool to detect arp poisoning attacks☆55Updated 7 years ago
- A python flask app that is purposefully vulnerable to SQL injection and XSS attacks. To be used for demonstrating attacks☆71Updated last year
- Implementation Hide Text In Image with encryption☆46Updated 5 years ago
- Scans the internet for open FTP servers looking for common malware bot droppers and grabs them for sampling. Also provides support for up…☆48Updated 8 years ago
- Temporary Email Service Within Terminal☆11Updated 5 years ago
- A threaded, recursive, web directory brute-force scanner over HTTP/2.☆36Updated 5 years ago
- [DEPRECATED] Kadabra is my automatic LFI Exploiter and Scanner, written in C++ and a couple extern module in Python.☆35Updated 5 years ago
- Steganography in Twitter using retweets☆12Updated 3 years ago
- Code that I adapted from the "Violent Python" book☆57Updated 11 years ago
- A simple attack against gcc and Python via kernel module, with highly detailed comments.☆25Updated 10 years ago
- Under Your Radar (UYR): Exfiltration using Steganography☆18Updated 10 years ago
- Personal notes and lab results pertaining to the text "Practical Malware Analysis" by Michael Sikorski and Andrew Honiq.☆12Updated 7 years ago
- Crawl Google and Bing to find emails, subdomains and URLs associated to a target domain☆51Updated 4 years ago
- ringzer0team challange solutions☆34Updated 9 years ago
- A few SQL and XSS attack tools☆40Updated 5 years ago
- A Simple PE File Heuristics Scanners☆52Updated 6 years ago
- A simple XSS finding tool☆109Updated 6 years ago
- Cross-Site Scripting (XSS) command line tool for testing lists of XSS payloads on web apps.☆140Updated 2 years ago
- patched information leak leaking full names associated with some email addresses including but not limited to gmail☆36Updated 4 years ago