jakekarnes42 / stegView external linksLinks
An exploration into Steganography with Python
☆14Mar 12, 2017Updated 8 years ago
Alternatives and similar repositories for steg
Users that are interested in steg are comparing it to the libraries listed below
Sorting:
- Hierarchical Deterministic Wallet tools based on BIP0032☆18Apr 20, 2022Updated 3 years ago
- Saratov State University, CSIT. Discipline "cryptographic methods of information security" (криптографические методы защиты информации, r…☆15Jun 28, 2018Updated 7 years ago
- Steganography is data hidden within data. Steganography is an encryption technique that can be used along with cryptography as an extra-s…☆22Mar 16, 2017Updated 8 years ago
- Debloat AOSP and MIUI☆10Dec 8, 2022Updated 3 years ago
- lightshot crawler that downloads random screenshots uploaded to their service.☆10Mar 25, 2021Updated 4 years ago
- Agoraphobia Virtual Reality Therapy Solution☆12May 10, 2020Updated 5 years ago
- This Project Describes the use of LSB Steganography, with a python program added to further implement it. I havn't writtent the algorithm…☆12Dec 9, 2020Updated 5 years ago
- 📧A disposable email client built with Flask. Need a temporary email? Look no further!☆16Sep 12, 2018Updated 7 years ago
- ScummVM main repository☆10Jan 1, 2026Updated last month
- Steganography( LSB IMAGES ) using AES Cryptography together☆13Nov 7, 2014Updated 11 years ago
- This is bombing tool☆15Dec 1, 2023Updated 2 years ago
- A compatibility guide for Bitcoin wallets☆11Mar 28, 2023Updated 2 years ago
- StegsnowBruteForcer — outil Python pour brute-force de mots de passe dans les documents.☆15Aug 7, 2025Updated 6 months ago
- ArrowView component for drawing pointers between components easely☆11Jan 4, 2023Updated 3 years ago
- Benchmark your NCNN models on 3DS(or crash)☆10Apr 15, 2024Updated last year
- 💣СМС Бомбер от команды HZF💣☆13Feb 21, 2024Updated last year
- A keylogger that sends emails with log attachment - works on all OS☆11Oct 30, 2021Updated 4 years ago
- Adventure through a growing number of incredibly immersive experiences. Forget teleportation, stick movement or smooth locomotion. Walk a…☆10Dec 10, 2022Updated 3 years ago
- Download SoundCloud artists in parallel☆10Jun 4, 2025Updated 8 months ago
- Python Steganography data hiding in image☆10Dec 25, 2021Updated 4 years ago
- Final year undergraduate project - embedding secret messages into a live video stream, transmitting the stream, and extracting the messag…☆12Mar 27, 2017Updated 8 years ago
- An HTML experiment for generating randomly created CSS3 gradients (both linear and radial)☆12Sep 5, 2018Updated 7 years ago
- [2021] Collaborative Cinematic Virtual Reality Production Tool (CCVRPT): a Quest application for VR artists.☆13Nov 15, 2025Updated 2 months ago
- UCheck Bug Tracker☆12Dec 22, 2023Updated 2 years ago
- I created this tool to fix corrupt Word documents (non-binary, just open xml files). Mainly this applies to the .docx format. It basicall…☆12Apr 29, 2022Updated 3 years ago
- VR Application for personalized pinch rehabilitation, Final project in Software Engineering B.Sc.☆10Dec 10, 2022Updated 3 years ago
- Example server and client implementation showing how Bitcoin based API payments can be done☆13Mar 23, 2016Updated 9 years ago
- A modified version of the Syndicate Wars port created by vexillium☆13May 22, 2017Updated 8 years ago
- JavaScript implementation of the BitID authentication protocol: https://github.com/bitid/bitid☆16Sep 15, 2019Updated 6 years ago
- Моя 3D игра под MS-DOS Doom-4 2002 года. Модификация 2005 и 2015 года. Однако, стиль кода 2002 года. Поэтому ждать совершенного кода не с…☆11Feb 18, 2018Updated 7 years ago
- ☆14May 1, 2025Updated 9 months ago
- Under Your Radar (UYR): Exfiltration using Steganography☆18Mar 28, 2015Updated 10 years ago
- A python script for digital image steganography using Fast Fourier Transform.☆11Aug 30, 2024Updated last year
- ☆11Apr 3, 2020Updated 5 years ago
- Linux kernel level keylogger that uses Twitter as a covert channel to get information of keystrokes and user data into the attacker using…☆11Jan 20, 2023Updated 3 years ago
- Developer calls agendas and transcripts☆12Apr 15, 2023Updated 2 years ago
- 2FA server for encrypted private key backup☆11Jun 24, 2025Updated 7 months ago
- Steganography in Twitter using retweets☆12Jun 19, 2022Updated 3 years ago
- A lightweight p2p resolver for Namecoin names. Allows for thin clients to lookup namecoin .bit websites without needing the full namecoin…☆11Aug 11, 2015Updated 10 years ago