jakekarnes42 / steg
An exploration into Steganography with Python
☆14Updated 8 years ago
Alternatives and similar repositories for steg:
Users that are interested in steg are comparing it to the libraries listed below
- Store arbitrary files inside PNGs to overcome nonsensical file type restrictions☆30Updated 7 years ago
- A steganographic program that encodes files in pictures☆106Updated 6 years ago
- Browser agnostic extension that enables pasting into password fields...☆15Updated 5 years ago
- Hide any file in a PNG Image☆20Updated 8 years ago
- Script that turns .pcap files into a .mid file to be played☆15Updated 7 years ago
- An add-on to help TOR users find hidden services for ClearNet sites they use every day☆32Updated 7 years ago
- A collection of steganography tools.☆15Updated 4 years ago
- Twitter as an extra entropy source☆100Updated 6 years ago
- An example chrome extension to demonstrate the dangers of injecting javascript and html into a page☆35Updated 7 years ago
- Text steganography based on Markov chains☆32Updated 11 years ago
- Video steganography implementation☆99Updated 7 years ago
- Hardware for the Breaking Bitcoin Board☆12Updated 7 years ago
- Create your own TOR hidden service, and keep it secure. A guide on how to create a virtual machine that runs a tor hidden service website…☆92Updated 9 years ago
- An open source encryption program that uses the "one-time pad" method.☆32Updated 4 years ago
- A pure Python GUI app for GPG functionality and peer-to-peer encrypted messaging over Tor☆71Updated 4 years ago
- Detect embedded cryptocurrency miners based on CPU usage☆20Updated 7 years ago
- python version of "house party protocol" program☆25Updated 10 years ago
- Windows based IRC Bot☆43Updated 10 years ago
- I hacked Minesweeper into putting flags on all the mined squares when starting. Yoohoo.☆66Updated 7 years ago
- Utilize Pastebin's scraping API to find interesting pastes.☆16Updated 5 years ago
- Uses Shodan to locate HackingTeam C&C Servers.☆78Updated 9 years ago
- Privacy enhanced instant messenger☆44Updated 5 years ago
- A demo of altering an opened tab after a timer☆123Updated 8 years ago
- Hourglass cryptographically locks your files so they can only be read after a certain amount of time.☆25Updated 8 years ago
- Tools for 802.11 information gathering.☆119Updated 2 years ago
- A tool for automating cracking methodologies through Hashcat from the TrustedSec team.☆10Updated 6 years ago
- An experimental implementation of a bot client which interprets commands through Twitter, thus requiring no hosting of servers from the c…☆44Updated 9 years ago
- Check proxies to see if they are valid and working.☆6Updated 9 years ago
- Steg is a simple python library for hiding and extracting messages from losslessly compressed images using least-significant-bit (LSB) st…☆33Updated last year
- usbWatchdog - monitor changes to your usb ports, and if anything is plugged in or removed, wipe RAM and shut down.☆50Updated 7 years ago