hitanshu-dhawan / ImageSteganographyView external linksLinks
ㅤA C++ program for Image Steganography
☆74Jun 19, 2019Updated 6 years ago
Alternatives and similar repositories for ImageSteganography
Users that are interested in ImageSteganography are comparing it to the libraries listed below
Sorting:
- Image-steganography tool☆15Aug 27, 2022Updated 3 years ago
- Static C++ image steganography library.☆11Jan 2, 2018Updated 8 years ago
- Still in dev mode☆12Apr 24, 2018Updated 7 years ago
- LSB-test☆12Jul 18, 2017Updated 8 years ago
- Microsoft Office 365 EWS (Exchange Web Services) Client Library☆10Jan 7, 2015Updated 11 years ago
- This is a patched version of ExchangeRelayX☆14Aug 13, 2020Updated 5 years ago
- Outlook addin Back Door☆11Dec 2, 2015Updated 10 years ago
- Deal with Windows Registry from Nim☆34Apr 4, 2024Updated last year
- EternalRomance&Eternalchampion&Eternalblue☆10May 1, 2017Updated 8 years ago
- Contains poc's and my research works☆31Feb 13, 2023Updated 3 years ago
- SumatraPDF reader☆14Mar 18, 2017Updated 8 years ago
- Save a screenshot of the Windows desktop from command line☆16Aug 2, 2016Updated 9 years ago
- Steganography algorithms implemented in C++ with OpenCV.☆42Apr 30, 2021Updated 4 years ago
- Office365 Tenants List☆16Jun 12, 2018Updated 7 years ago
- A simple UPnP port forward tool☆19Aug 4, 2018Updated 7 years ago
- Steganography Payload☆47Jul 18, 2017Updated 8 years ago
- CERIO RCE CVE-2018-18852, authenticated (vendor defaults) web-based RCE as root user.☆46Jan 26, 2019Updated 7 years ago
- 社会工程学☆20Apr 18, 2018Updated 7 years ago
- C# 编写的用于 Dropbox 文件上传☆20Jan 16, 2022Updated 4 years ago
- This repository contains some details about abusing outlook.☆27Aug 17, 2018Updated 7 years ago
- Converts a command to a base64 powershell compatible string☆27Jul 31, 2014Updated 11 years ago
- Invokes a Windows Security Login Prompt and outputs the clear text password.☆25Jun 17, 2017Updated 8 years ago
- ☆25Apr 30, 2021Updated 4 years ago
- Ping Exfiltration Command and Control (PiX-C2)☆32May 15, 2015Updated 10 years ago
- manipulating cointegrated pairs to achieve a market-neutral strategy that outperforms indices☆12Jan 12, 2021Updated 5 years ago
- estruct traverses javascript projects and maps all the dependencies and relationships to a JSON. the output can be used to build network …☆12Aug 22, 2021Updated 4 years ago
- Ex-pv8's☆64Aug 28, 2019Updated 6 years ago
- This contains a number of examples demonstrating how to use callback functions in supported aggressor script functions☆38Mar 17, 2025Updated 11 months ago
- C++ template library for AVR XMega peripherals☆39Apr 10, 2019Updated 6 years ago
- ☆35Jul 5, 2020Updated 5 years ago
- ☆31Jul 11, 2020Updated 5 years ago
- Sample Android App for ALL made with ❤️☆11Oct 1, 2017Updated 8 years ago
- Microsoft Applocker evasion tool☆39Nov 26, 2019Updated 6 years ago
- This is a filter bypass exploit that results in arbitrary file upload and remote code execution in class.upload.php <= 2.0.4☆36Dec 8, 2019Updated 6 years ago
- ☆35Jan 24, 2022Updated 4 years ago
- ☆92Apr 17, 2021Updated 4 years ago
- Automated build of OpenWrt firmware for Phicomm K2P wireless router.☆31May 2, 2022Updated 3 years ago
- Ergonomic GMP Integers for Nim☆10Sep 1, 2023Updated 2 years ago
- This is a simple Powershell script that can be used to install a windows .MSI file(Software) without going through selecting and pressing…☆13Jul 5, 2019Updated 6 years ago