SteCoSteg is OutGuess successor and Vernam cipher analog in steganography.
☆56Feb 16, 2019Updated 7 years ago
Alternatives and similar repositories for SteCoSteg
Users that are interested in SteCoSteg are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Implementation of several Steganography and steganalysis techniques.☆50Nov 20, 2025Updated 4 months ago
- steganography project for rowdy hacks 2019 hackathon☆20Dec 28, 2021Updated 4 years ago
- A copy of my Mathematics and Computer Engineering B.Sc. thesis☆20Dec 8, 2020Updated 5 years ago
- Hide files and data in plain ascii text that is invisible to the naked eye☆18Feb 10, 2015Updated 11 years ago
- Image Steganography using QR-codes written in Python 3.7.☆12Mar 13, 2021Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- DDoor - cross platform backdoor using dns txt records☆30Sep 27, 2021Updated 4 years ago
- Linked Pixel Steganography (LPS) technique is a variant of the well-known LSB steganography. It can be applied to any type of images.☆20May 16, 2023Updated 2 years ago
- (◍•﹏•) - Hi, I'm Eve☆21May 20, 2018Updated 7 years ago
- Authy integration javascripts☆17Jun 17, 2013Updated 12 years ago
- Entropic Password Manager Generator is a cross-platform, most secure and storageless password manager that generates passwords☆22Feb 10, 2021Updated 5 years ago
- IDPS & SandBox & AntiVirus STEALTH KILLER. MorphAES is the world's first polymorphic shellcode engine, with metamorphic properties and ca…☆325Jun 25, 2022Updated 3 years ago
- Porting BlueKeep PoC from @Ekultek to actual exploits☆11Jun 9, 2019Updated 6 years ago
- Draws pictures with Unicode Braille characters☆15May 23, 2016Updated 9 years ago
- badUSB & RubberDucky & PoisonTap ultimate mitigation for Linux☆69Oct 1, 2017Updated 8 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆15Mar 2, 2014Updated 12 years ago
- icmp tunnel. nuff said.☆25Jan 3, 2016Updated 10 years ago
- Saratov State University, CSIT. Discipline "cryptographic methods of information security" (криптографические методы защиты информации, r…☆15Jun 28, 2018Updated 7 years ago
- scripts to create zip bombs☆12Nov 26, 2012Updated 13 years ago
- A set of demos and a PowerShell module to interact with DotNetInterop.☆69Apr 7, 2018Updated 8 years ago
- 📡 Turn your Raspberry Pi into an FM transmitter broadcasting live audio from JACK☆27Jan 26, 2020Updated 6 years ago
- Python Implementation of Pixel Value Differencing based Steganography (LSB) - PNG Cover Images☆22Jun 25, 2022Updated 3 years ago
- ☆12Jul 15, 2022Updated 3 years ago
- Data exfiltration using covert channels in the TCP/IP protocol with some basic steganography.☆12Apr 19, 2017Updated 8 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- PST Parser using pypff - Export all email headers and body to csv or json☆10Nov 8, 2019Updated 6 years ago
- Creating executables from ELF-coredumps☆10Dec 7, 2015Updated 10 years ago
- The Hall of Ancient Exploitation Tools☆16Oct 14, 2019Updated 6 years ago
- A mini project to exfiltrate data via QR codes☆19Dec 5, 2025Updated 4 months ago
- log file scrubber☆15Jul 27, 2018Updated 7 years ago
- The source code of paper "An Embedding Cost Learning Framework Using GAN"☆34Oct 18, 2019Updated 6 years ago
- An iPhone 7 running below iOS 11 can be hijacked by a nearby hostile WiFi router.☆39Sep 28, 2017Updated 8 years ago
- A spiritual .NET equivalent to the Gargoyle memory scanning evasion technique☆52Dec 6, 2018Updated 7 years ago
- Splicing image forgery detection based on DCT and Local Binary Pattern☆10Apr 30, 2020Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Implementation Hide Text In Image with encryption☆46Jan 31, 2020Updated 6 years ago
- Malicious use of macho, such as dump-runtime-macho, function-hook.☆15Mar 20, 2017Updated 9 years ago
- RFCat scripts to dump HCS keeloq encoder data☆13Sep 25, 2016Updated 9 years ago
- Peap Bomb is a password sprayer for WPA/WPA2 enterprise wireless that is leveraging PEAP for Authentication.☆10Feb 18, 2021Updated 5 years ago
- One of the active development branches for colordiff☆24Sep 30, 2011Updated 14 years ago
- Get a temporary identity with a temporary email address, name, and phone number.☆12Apr 23, 2022Updated 3 years ago
- Universal Linux Application SDK - Create once. Run everywhere.☆10Jun 25, 2018Updated 7 years ago