A python steganography module to store messages or files protected with AES-256 encryption inside an image.
☆126Mar 6, 2025Updated last year
Alternatives and similar repositories for cryptosteganography
Users that are interested in cryptosteganography are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Improvised LSB Steganography technique using Pixel Locator Sequence with AES. Implementation for paper https://ieeexplore.ieee.org/abstra…☆11Apr 17, 2021Updated 5 years ago
- Image Steganography using QR-codes written in Python 3.7.☆12Mar 13, 2021Updated 5 years ago
- Extra files for Flipper Zero video player app.☆14Mar 15, 2023Updated 3 years ago
- Final year undergraduate project - embedding secret messages into a live video stream, transmitting the stream, and extracting the messag…☆12Mar 27, 2017Updated 9 years ago
- Roblox-Xeno is a custom game server for the popular online gaming platform Roblox, offering enhanced gameplay features and exclusive cont…☆21Feb 19, 2026Updated 3 months ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆12Apr 20, 2017Updated 9 years ago
- Embeds messages into images using the Least Significant Bit algorithm☆11Jan 4, 2023Updated 3 years ago
- Video Steganography for Piracy Prevention☆12Oct 16, 2016Updated 9 years ago
- Simple steganography example of concealing a hidden messages in an image file.☆13Jun 11, 2017Updated 8 years ago
- Zabbix Jsrpc.php Injection Exploit☆25Aug 29, 2016Updated 9 years ago
- Python Implementation of Pixel Value Differencing based Steganography (LSB) - PNG Cover Images☆22Jun 25, 2022Updated 3 years ago
- Spray365 makes spraying Microsoft accounts (Office 365 / Azure AD) easy through its customizable two-step password spraying approach. The…☆11Dec 8, 2021Updated 4 years ago
- A python steganography module to store messages or files protected with AES-256 encryption inside an image.☆10Jan 18, 2022Updated 4 years ago
- A quick and dirty way to bypass encrypted EPA to connect to a NetScaler Gateway☆20Oct 11, 2019Updated 6 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- ✨Encoding text messages✍🏻 within images🖼 and videos📽✨☆15Nov 13, 2020Updated 5 years ago
- Repo for The Crown: Exploratory Analysis of Nim Malware DEF CON 615 talk☆46Jan 23, 2022Updated 4 years ago
- Linked Pixel Steganography (LPS) technique is a variant of the well-known LSB steganography. It can be applied to any type of images.☆21May 16, 2023Updated 3 years ago
- Ansible playbook for configuring Kali Linux to personal preferences☆10Oct 5, 2022Updated 3 years ago
- ☆61Feb 10, 2022Updated 4 years ago
- Very simple frequency domain(FFT based) image steganography/waterprint/signature. https://www.zhihu.com/question/50735753/answer/12259327…☆24Jun 9, 2020Updated 5 years ago
- LinkedIn reconnaissance tool☆11Dec 29, 2019Updated 6 years ago
- Offensive V Programming☆18Nov 3, 2021Updated 4 years ago
- a python implement of f5 steganography☆50Mar 30, 2012Updated 14 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Vendor-Neutral Security Tool Automation Controller (over REST)☆28Jun 28, 2019Updated 6 years ago
- CIS 4110 Comparison of Image Steganography Techniques (DCT vs LSB)☆19Jan 9, 2020Updated 6 years ago
- Shellcode runner to execute malicious payload and bypass AV☆14Nov 28, 2021Updated 4 years ago
- A simple toolkit on extracting RSA Software Tokens from RSA SecureID☆42May 6, 2020Updated 6 years ago
- Proof Of Concept code for OctoberCMS Auth Bypass CVE-2021-32648☆12Jan 14, 2022Updated 4 years ago
- Sample code for DNS spoofing with ARP poisoning.☆21Mar 21, 2015Updated 11 years ago
- Veil 3.1.X (Check version info in Veil at runtime)☆16Aug 14, 2019Updated 6 years ago
- ☆11Dec 18, 2018Updated 7 years ago
- tiny string formatting for C☆13Jan 31, 2026Updated 3 months ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- (CNVD-2021-26422)亿邮电子邮件系统 远程命令执行漏洞☆12Apr 28, 2021Updated 5 years ago
- Simple mods to wpa_supplicant to allow more efficient online bruting☆20Aug 23, 2019Updated 6 years ago
- ☆37May 4, 2026Updated 2 weeks ago
- Building ActiveDirectory Lab for practicing various attack vectors used during Red Team engagement.☆38Feb 16, 2020Updated 6 years ago
- A simple python script to wish my friends on facebook on their birthays☆12Mar 28, 2016Updated 10 years ago
- My Blog☆12Feb 4, 2026Updated 3 months ago
- Tool for pivoting over SMB pipes☆16Jul 20, 2019Updated 6 years ago