SteCoSteg is OutGuess successor and Vernam cipher analog in steganography.
☆56Feb 16, 2019Updated 7 years ago
Alternatives and similar repositories for SteCoSteg
Users that are interested in SteCoSteg are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- DeCryKe is a technique to transform almost any cryptographic algorithm into deniable-one, it is a decry of Russia's anti-terrorism law (a…☆23Dec 12, 2017Updated 8 years ago
- steganography project for rowdy hacks 2019 hackathon☆20Dec 28, 2021Updated 4 years ago
- ☆12Apr 20, 2017Updated 9 years ago
- Video Steganography for Piracy Prevention☆12Oct 16, 2016Updated 9 years ago
- Use F5 steganography to embed text in jpeg. EDB means Encrypt and Decrypt Bit.☆16Aug 9, 2019Updated 6 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A list of covert channels and steganography/steganalysis resources (books, papers & tools)☆103Jul 10, 2022Updated 3 years ago
- Hide files and data in plain ascii text that is invisible to the naked eye☆18Feb 10, 2015Updated 11 years ago
- An Improved CNN Steganalysis Architecture Based on “Catalyst Kernels” and Transfer Learning☆26Aug 27, 2019Updated 6 years ago
- Image Steganography using QR-codes written in Python 3.7.☆12Mar 13, 2021Updated 5 years ago
- ✨Encoding text messages✍🏻 within images🖼 and videos📽✨☆15Nov 13, 2020Updated 5 years ago
- Yet another Stego Tool☆405Apr 10, 2026Updated 3 weeks ago
- DDoor - cross platform backdoor using dns txt records☆30Sep 27, 2021Updated 4 years ago
- Discovery will gather DNS entry, subdomains and domains linked, all files publicly exposed to gather metadatas, check for dumps on Pasteb…☆14Mar 18, 2019Updated 7 years ago
- Very simple frequency domain(FFT based) image steganography/waterprint/signature. https://www.zhihu.com/question/50735753/answer/12259327…☆24Jun 9, 2020Updated 5 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Authy integration javascripts☆17Jun 17, 2013Updated 12 years ago
- Entropic Password Manager Generator is a cross-platform, most secure and storageless password manager that generates passwords☆22Feb 10, 2021Updated 5 years ago
- CIS 4110 Comparison of Image Steganography Techniques (DCT vs LSB)☆19Jan 9, 2020Updated 6 years ago
- ☆10Dec 27, 2019Updated 6 years ago
- Tool to create and test shellcodes from custom assembly sources (with some encoding options)☆40Aug 22, 2018Updated 7 years ago
- The EMV QR Code Decoder Library is a Kotlin-based utility that decodes EMV QR codes into structured data. It provides classes and enums t…☆12Apr 13, 2024Updated 2 years ago
- a python implement of f5 steganography☆50Mar 30, 2012Updated 14 years ago
- A strings decryptor for Phoenix Protector using the stack thanks to https://github.com/MindSystemm/StackYenoDeobfuscator.☆10Jun 8, 2020Updated 5 years ago
- Porting BlueKeep PoC from @Ekultek to actual exploits☆11Jun 9, 2019Updated 6 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Draws pictures with Unicode Braille characters☆15May 23, 2016Updated 9 years ago
- User generated dynamic character sheet templates for Obsidian Portal. Make 'em sweet!☆20Apr 15, 2021Updated 5 years ago
- badUSB & RubberDucky & PoisonTap ultimate mitigation for Linux☆69Oct 1, 2017Updated 8 years ago
- Code for the EMNLP 2021 Oral paper "Are Gender-Neutral Queries Really Gender-Neutral? Mitigating Gender Bias in Image Search" https://arx…☆12Feb 6, 2023Updated 3 years ago
- ☆15Mar 2, 2014Updated 12 years ago
- Code that allows running another windows PE in the same address space as the host process.☆10Nov 19, 2019Updated 6 years ago
- digital image steganography using BPCS (Bit-Plane Complexity Segmentation Steganography)☆32Aug 15, 2024Updated last year
- Automated Image Forgery Detection through Classification of JPEG Ghosts☆12Oct 3, 2023Updated 2 years ago
- Saratov State University, CSIT. Discipline "cryptographic methods of information security" (криптографические методы защиты информации, r…☆15Jun 28, 2018Updated 7 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ☆11Nov 18, 2024Updated last year
- A set of demos and a PowerShell module to interact with DotNetInterop.☆69Apr 7, 2018Updated 8 years ago
- Under Your Radar (UYR): Exfiltration using Steganography☆18Mar 28, 2015Updated 11 years ago
- 📡 Turn your Raspberry Pi into an FM transmitter broadcasting live audio from JACK☆27Jan 26, 2020Updated 6 years ago
- Python Implementation of Pixel Value Differencing based Steganography (LSB) - PNG Cover Images☆22Jun 25, 2022Updated 3 years ago
- ☆12Jul 15, 2022Updated 3 years ago
- WMI Shell project : proof-of-concept of remote access to a Windows machine using only the WMI service.☆44Dec 27, 2018Updated 7 years ago