SteCoSteg is OutGuess successor and Vernam cipher analog in steganography.
☆56Feb 16, 2019Updated 7 years ago
Alternatives and similar repositories for SteCoSteg
Users that are interested in SteCoSteg are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- DeCryKe is a technique to transform almost any cryptographic algorithm into deniable-one, it is a decry of Russia's anti-terrorism law (a…☆23Dec 12, 2017Updated 8 years ago
- Implementation of several Steganography and steganalysis techniques.☆50Nov 20, 2025Updated 4 months ago
- steganography project for rowdy hacks 2019 hackathon☆20Dec 28, 2021Updated 4 years ago
- ☆12Apr 20, 2017Updated 8 years ago
- Use F5 steganography to embed text in jpeg. EDB means Encrypt and Decrypt Bit.☆16Aug 9, 2019Updated 6 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- A list of covert channels and steganography/steganalysis resources (books, papers & tools)☆101Jul 10, 2022Updated 3 years ago
- A copy of my Mathematics and Computer Engineering B.Sc. thesis☆20Dec 8, 2020Updated 5 years ago
- Hide files and data in plain ascii text that is invisible to the naked eye☆18Feb 10, 2015Updated 11 years ago
- Image Steganography using QR-codes written in Python 3.7.☆12Mar 13, 2021Updated 5 years ago
- Discovery will gather DNS entry, subdomains and domains linked, all files publicly exposed to gather metadatas, check for dumps on Pasteb…☆14Mar 18, 2019Updated 7 years ago
- Very simple frequency domain(FFT based) image steganography/waterprint/signature. https://www.zhihu.com/question/50735753/answer/12259327…☆24Jun 9, 2020Updated 5 years ago
- (◍•﹏•) - Hi, I'm Eve☆21May 20, 2018Updated 7 years ago
- Tool to create and test shellcodes from custom assembly sources (with some encoding options)☆34Aug 22, 2018Updated 7 years ago
- CIS 4110 Comparison of Image Steganography Techniques (DCT vs LSB)☆19Jan 9, 2020Updated 6 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- The EMV QR Code Decoder Library is a Kotlin-based utility that decodes EMV QR codes into structured data. It provides classes and enums t…☆12Apr 13, 2024Updated last year
- a python implement of f5 steganography☆50Mar 30, 2012Updated 13 years ago
- IDPS & SandBox & AntiVirus STEALTH KILLER. MorphAES is the world's first polymorphic shellcode engine, with metamorphic properties and ca…☆328Jun 25, 2022Updated 3 years ago
- Porting BlueKeep PoC from @Ekultek to actual exploits☆11Jun 9, 2019Updated 6 years ago
- badUSB & RubberDucky & PoisonTap ultimate mitigation for Linux☆69Oct 1, 2017Updated 8 years ago
- Code for the EMNLP 2021 Oral paper "Are Gender-Neutral Queries Really Gender-Neutral? Mitigating Gender Bias in Image Search" https://arx…☆12Feb 6, 2023Updated 3 years ago
- ☆15Mar 2, 2014Updated 12 years ago
- ☆20Jul 14, 2019Updated 6 years ago
- Automated Image Forgery Detection through Classification of JPEG Ghosts☆12Oct 3, 2023Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- digital image steganography using BPCS (Bit-Plane Complexity Segmentation Steganography)☆32Aug 15, 2024Updated last year
- Saratov State University, CSIT. Discipline "cryptographic methods of information security" (криптографические методы защиты информации, r…☆15Jun 28, 2018Updated 7 years ago
- scripts to create zip bombs☆12Nov 26, 2012Updated 13 years ago
- A set of demos and a PowerShell module to interact with DotNetInterop.☆69Apr 7, 2018Updated 7 years ago
- Python Implementation of Pixel Value Differencing based Steganography (LSB) - PNG Cover Images☆22Jun 25, 2022Updated 3 years ago
- Euli is not a computer game but a tool which helps you set up a real life treasure hunt☆44Feb 6, 2021Updated 5 years ago
- ☆12Jul 15, 2022Updated 3 years ago
- A project created for an AR-VR elective course in Sem 5☆12Dec 11, 2020Updated 5 years ago
- PST Parser using pypff - Export all email headers and body to csv or json☆10Nov 8, 2019Updated 6 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Creating executables from ELF-coredumps☆10Dec 7, 2015Updated 10 years ago
- The Hall of Ancient Exploitation Tools☆16Oct 14, 2019Updated 6 years ago
- Python package to encode THREE QR codes into ONE.☆11Jun 14, 2022Updated 3 years ago
- log file scrubber☆15Jul 27, 2018Updated 7 years ago
- htpw is a project to increase the security of your WordPress!☆57Jan 21, 2026Updated 2 months ago
- The source code of paper "An Embedding Cost Learning Framework Using GAN"☆34Oct 18, 2019Updated 6 years ago
- Proof of Concept for CVE-2018-11776☆21Sep 12, 2018Updated 7 years ago