深度隐写术
☆18Oct 28, 2020Updated 5 years ago
Alternatives and similar repositories for deep-steganography
Users that are interested in deep-steganography are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A PyTorch implementation of image steganography utilizing deep convolutional neural networks☆139Apr 10, 2018Updated 8 years ago
- Paper implementation for "End-to-end Trained CNN Encoder-Decoder Networks for Image Steganography"☆15Jan 27, 2020Updated 6 years ago
- Grey-box fuzzer SIVO☆13Jul 11, 2021Updated 4 years ago
- ☆10Jan 3, 2023Updated 3 years ago
- ☆11Nov 14, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- An automation tool to generate, obfuscate, compile and run symbolic execution on c source files☆14Feb 17, 2021Updated 5 years ago
- Code and data release for CCS'2022 paper "Understanding IoT Security from a Market-Scale Perspective"☆12Apr 13, 2023Updated 3 years ago
- Code from the paper: Neurlux: Dynamic Malware Analysis Without Feature Engineering☆13Dec 27, 2020Updated 5 years ago
- scripts to create zip bombs☆12Nov 26, 2012Updated 13 years ago
- Implementation of Contrastive Predictive Coding for Natural Language☆10Sep 16, 2020Updated 5 years ago
- Under Your Radar (UYR): Exfiltration using Steganography☆18Mar 28, 2015Updated 11 years ago
- Data exfiltration using covert channels in the TCP/IP protocol with some basic steganography.☆12Apr 19, 2017Updated 9 years ago
- PST Parser using pypff - Export all email headers and body to csv or json☆10Nov 8, 2019Updated 6 years ago
- ☆20May 27, 2020Updated 5 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- ☆10Dec 25, 2019Updated 6 years ago
- StegsnowBruteForcer — outil Python pour brute-force de mots de passe dans les documents.☆15Feb 17, 2026Updated 2 months ago
- Source Code for 'AI for Healthcare with Keras and Tensorflow 2.0' by Anshik Bansal☆15Jul 19, 2021Updated 4 years ago
- A pytorch implementation of Deep Learning Hierarchical Representation for Image Steganalysis (YeNet)☆22Sep 15, 2022Updated 3 years ago
- 2019 and 2020 Top Conference Paper☆12Apr 19, 2021Updated 5 years ago
- Final year undergraduate project - embedding secret messages into a live video stream, transmitting the stream, and extracting the messag…☆12Mar 27, 2017Updated 9 years ago
- Implementation of Relation Extraction with Multi-instance Multi-label Convolutional Neural Networks in tensorflow☆15Apr 2, 2017Updated 9 years ago
- Peap Bomb is a password sprayer for WPA/WPA2 enterprise wireless that is leveraging PEAP for Authentication.☆10Feb 18, 2021Updated 5 years ago
- Get a temporary identity with a temporary email address, name, and phone number.☆12Apr 23, 2022Updated 4 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Helps you saving your mail attachments (e.g. epub-files, PDFs) to a temporary directory, convert the files to MOBI-format and send them d…☆14Feb 24, 2019Updated 7 years ago
- The encrypted steganography filesystem☆42Jan 12, 2011Updated 15 years ago
- A python tool for sms bombing only Robi and Airtel numbers.☆13Feb 24, 2025Updated last year
- Deep Steganalysis training script☆13May 1, 2025Updated last year
- Command line tool for launching attacks against Machine Learning Malware detectors.☆19Jun 18, 2023Updated 2 years ago
- This is bombing tool☆16Dec 1, 2023Updated 2 years ago
- An interactive implementation of (parts of) the "Bomb Defusal Manual" from the game "Keep Talking and Nobody Explodes"☆13Dec 10, 2015Updated 10 years ago
- Building an Intelligent Voice Assistant from scratch Emulation a Google Assistant on a RaspberryPi and Arduino Nano 33 BLE☆15Jan 26, 2021Updated 5 years ago
- Temporary Email Service Within Terminal☆11Aug 4, 2020Updated 5 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Automating the boring stego work for you..☆13Feb 26, 2019Updated 7 years ago
- Embeds messages into images using the Least Significant Bit algorithm☆11Jan 4, 2023Updated 3 years ago
- Hide data in plaintext☆16Mar 25, 2019Updated 7 years ago
- An effective menu driven GUI made using Tkinter which takes in an image and returns a new image with the text data encoded in the pixels.☆10Oct 3, 2023Updated 2 years ago
- ☆24Apr 13, 2023Updated 3 years ago
- ☆28Aug 6, 2022Updated 3 years ago
- ☆11Apr 5, 2021Updated 5 years ago