kaushalmeena / digi-cloakLinks
A web app that hides secrets in plain sight securely in images with the help of AES encryption and LSB steganography technique.
☆76Updated 8 months ago
Alternatives and similar repositories for digi-cloak
Users that are interested in digi-cloak are comparing it to the libraries listed below
Sorting:
- Private and self-hosted file sharing over the Tor network written in golang☆118Updated 3 weeks ago
- Tabserve Issue Tracker☆11Updated 2 years ago
- Anon pastebin☆66Updated 6 months ago
- Sanitize documents to safe PDFs, for active content removal☆39Updated 2 months ago
- E2E encrypted ephemeral messaging app. Share secrets securely without setup. Built with Next.js, Soketi, and OpenPGP.js. Self-hostable.☆11Updated 10 months ago
- Timelock Encryption made practical. A Typescript library for encrypting for the future.☆112Updated last year
- Secure secret sharing through the browser using web crypto. No server required!☆212Updated last year
- Armory Drive - USB encrypted drive with mobile unlock over BLE☆72Updated 2 months ago
- Search and extract blob files on the Ethereum Blockchain network☆45Updated 4 years ago
- Ephemeral, zero-knowledge, end-to-end post-quantum encrypted sensitive data sharing☆109Updated 2 months ago
- a fully in-browser tool to encrypt data with the age encryption tool.☆55Updated last month
- Linux kernel module which powers off the computer on certain text from keyboard☆39Updated 9 years ago
- Torrent distribution tool hosted on a EVM-compatible blockchain☆151Updated 2 years ago
- Hides message with invisible Unicode characters☆94Updated 9 months ago
- A dead man's switch for full but responsible disclosure of vulnerabilities☆55Updated 9 months ago
- Abusing Cloudflare Workers to establish persistence and exfiltrate sensitive data at the edge.☆18Updated 3 years ago
- 🔐A CLI to encrypt all the files and folder in your current working directory.☆42Updated last month
- bitdrain - remote p2p bandwidth/cpu overage attack against bitcoin, dogecoin, etc.☆39Updated last year
- If you still know the password and have Metamask's data files, you may be able to recover your wallet seed and imported private keys.☆23Updated last year
- Wipe RAM on shutdown and reboot - Cold Boot Attack Defense☆14Updated last month
- Fast syncronization across networks using speedy compression, lots of parallelization and fast hashmaps for keeping track of things inter…☆96Updated 11 months ago
- 🌌 A network agnostic DHT crawler, monitor, and measurement tool that exposes timely information about DHT networks.☆343Updated last month
- Force the traffic of a Firefox container tab to pass through VPN or Tor network☆66Updated last year
- Open Source External Attack Surface Management☆48Updated last year
- Tools to recover, extract and decrypt metamask wallets☆20Updated 3 months ago
- Jess is a cryptographic library and cli tool that focuses on usability and freedom.☆46Updated 8 months ago
- ☆95Updated last year
- Spawn shells anywhere. Fully peer-to-peer, authenticated, and end to end encrypted☆251Updated last year
- Quickly open your favorite Web IDE to review the selected smart contract codebase☆30Updated last year
- A zero knowledge messaging system built on zcash.☆41Updated 4 years ago