Steganography via adversarial training
☆15Dec 1, 2018Updated 7 years ago
Alternatives and similar repositories for advsteg
Users that are interested in advsteg are comparing it to the libraries listed below
Sorting:
- My implementation of y-DCGAN,which can automatically learn embedding change probability for digital images.☆10Mar 25, 2018Updated 7 years ago
- The source code of paper "An Embedding Cost Learning Framework Using GAN"☆34Oct 18, 2019Updated 6 years ago
- Pytorch implementation of "Hiding Images in Plain Sight: Deep Steganography" for Global NIPS Paper Implementation Challenge☆33Jan 29, 2018Updated 8 years ago
- List for learning image steganography☆36Jun 11, 2024Updated last year
- Implementation of "Invisible Steganography via Generative Adversarial Networks" (https://arxiv.org/abs/1807.08571)☆66Oct 11, 2018Updated 7 years ago
- 🤘🤘🤘SMS BOMB FOR BANGLADESH(BD),INDIA,PAKISTAN,UK,MALAYSIA,ISREAL,PALEASTINE,🤘🤘🤘☆17Jun 5, 2021Updated 4 years ago
- hiding an image or text within another image☆36Jun 18, 2018Updated 7 years ago
- 利用Python编写的微信消息轰炸脚本☆10Mar 19, 2021Updated 4 years ago
- This is bombing tool☆15Dec 1, 2023Updated 2 years ago
- Replication files for arXiv:1805.03735 Sequence Aggregation Rules for Anomaly Detection in Computer Network Traffic☆11Jan 6, 2019Updated 7 years ago
- 📧A disposable email client built with Flask. Need a temporary email? Look no further!☆16Sep 12, 2018Updated 7 years ago
- Steganography( LSB IMAGES ) using AES Cryptography together☆13Nov 7, 2014Updated 11 years ago
- StegsnowBruteForcer — outil Python pour brute-force de mots de passe dans les documents.☆15Feb 17, 2026Updated 2 weeks ago
- Joint adjustment image steganography networks☆10Aug 3, 2023Updated 2 years ago
- Python Steganography data hiding in image☆10Dec 25, 2021Updated 4 years ago
- Video Steganography for Piracy Prevention☆12Oct 16, 2016Updated 9 years ago
- - Anonymous E-Mail sending. - E-Mail bombing without logging in. - Sms bombing by victim no.☆10Oct 21, 2023Updated 2 years ago
- ☆10Apr 30, 2017Updated 8 years ago
- Automating the boring stego work for you..☆13Feb 26, 2019Updated 7 years ago
- ☆10Dec 18, 2024Updated last year
- scripts to create zip bombs☆12Nov 26, 2012Updated 13 years ago
- ☆10Jan 9, 2022Updated 4 years ago
- This is a repository for all the session summaries from the Beginners' Python and Machine Learning held in Brisbane.☆12Jan 30, 2026Updated last month
- Creating a NIDS based on a Deep Neural Network (CNN)☆11Dec 31, 2018Updated 7 years ago
- Image steganography usings Generative Adverserial Networks☆42Oct 12, 2024Updated last year
- Implemention of "Piracy Resistant Watermarks for Deep Neural Networks" in TensorFlow.☆12Dec 5, 2020Updated 5 years ago
- 💣СМС Бомбер от команды HZF💣☆13Feb 21, 2024Updated 2 years ago
- Final year undergraduate project - embedding secret messages into a live video stream, transmitting the stream, and extracting the messag…☆12Mar 27, 2017Updated 8 years ago
- A keylogger that sends emails with log attachment - works on all OS☆11Oct 30, 2021Updated 4 years ago
- Code for reproducing the results from "CrAM: A Compression-Aware Minimizer" accepted at ICLR 2023☆10Mar 1, 2023Updated 3 years ago
- ☆14Sep 6, 2023Updated 2 years ago
- Generate the Tracy-Widom distribution functions for beta = 1, 2, or 4 in Python☆10Mar 15, 2025Updated 11 months ago
- A modular framework and program for synchronous pwning with ssh, powered by Python 3, for educational and controlled penetration testing…☆10Sep 4, 2016Updated 9 years ago
- Under Your Radar (UYR): Exfiltration using Steganography☆18Mar 28, 2015Updated 10 years ago
- Implementation of LSB Steganography technique in Python 3. It also includes a GUI implementation.☆13May 25, 2020Updated 5 years ago
- Solutions to CTF problems.☆11May 29, 2016Updated 9 years ago
- FeGAN: Scaling Distributed GANs☆13Dec 31, 2020Updated 5 years ago
- An exploration of LLM steering☆24Jun 15, 2024Updated last year
- Use F5 steganography to embed text in jpeg. EDB means Encrypt and Decrypt Bit.☆15Aug 9, 2019Updated 6 years ago