kumarmah / JStegoView external linksLinks
Steganography tools for JPEG images
☆10Jul 30, 2013Updated 12 years ago
Alternatives and similar repositories for JStego
Users that are interested in JStego are comparing it to the libraries listed below
Sorting:
- An image steganography with high embedding capacity based on a genetic algorithm☆11Nov 9, 2019Updated 6 years ago
- OpenSearch custom lucene codecs for providing different on-disk index encoding (e.g., compression).☆14Feb 6, 2026Updated last week
- Attacks against proposed image encryption schemes☆10Apr 27, 2020Updated 5 years ago
- Implementation of Trivium Stream Cipher in Python☆16Jan 23, 2018Updated 8 years ago
- experimental port of nervana neon kernels in OpenCL☆11Jul 24, 2016Updated 9 years ago
- Steganography with help of LLM☆13Apr 28, 2025Updated 9 months ago
- ☆16May 12, 2025Updated 9 months ago
- This repository contains HPC application best practices, specifically designed and optimized to run on AWS.☆19Updated this week
- Image and text encryption using Shamir's Secret Sharing algorithm☆14Feb 17, 2020Updated 5 years ago
- Image Encryption using Chaos Mapping, Genetic Algorithms & Matrix Manipulations☆12Oct 25, 2019Updated 6 years ago
- Configuration tool for AMD Overdrive6 devices.☆20Mar 7, 2016Updated 9 years ago
- Virtual scroll module for native javascript applications☆11Feb 4, 2022Updated 4 years ago
- ☆14Apr 11, 2018Updated 7 years ago
- Matrix-specific branches of WebRTC☆11Feb 3, 2018Updated 8 years ago
- A curated list of browser fuzzing researches, papers, tools, ...☆13Jan 30, 2023Updated 3 years ago
- 离线的LLM文本隐写程序。Offline LLM text steganography program.☆21Sep 7, 2025Updated 5 months ago
- Tools I use to edit or manipulate Chaotica's XML files.☆12Aug 23, 2020Updated 5 years ago
- ECM Factorization on CUDA-GPUs☆14Sep 29, 2020Updated 5 years ago
- 基于C/C++开发的音视频动态库(使用超级简单,功能非常强大)☆12Jul 18, 2023Updated 2 years ago
- Code for Adaptation Network introduced in "Block-wise Scrambled Image Recognition Using Adaptation Network" paper (AAAI WS 2020)☆12Dec 3, 2019Updated 6 years ago
- ☆14Jul 21, 2025Updated 6 months ago
- Tool for using libc infoleaks to identify libc version from within your exploit.☆13Dec 29, 2022Updated 3 years ago
- Gave a talk on Vectorized emulation at Recon Montreal 2019, here are the slides☆18Jun 28, 2019Updated 6 years ago
- H.323 call generator☆16Feb 26, 2024Updated last year
- A Python implementation of HMAC_DRBG (see, NiST SP 800-90A).☆14Nov 18, 2015Updated 10 years ago
- Pure Rust implementation of LZ4 compression and decompression as a library☆17Jun 9, 2020Updated 5 years ago
- ☆19Oct 27, 2024Updated last year
- pwning challenge with a minimal hypervisor on apple hypervisor framework☆13May 13, 2019Updated 6 years ago
- DHT22 for Raspberry Pi with WiringPi☆18Aug 11, 2019Updated 6 years ago
- A Binary Ninja plugin for demangling Rust symbols.☆14Jul 9, 2023Updated 2 years ago
- Code for "Deep Residual Networks for Image in speech Steganography"☆16Mar 31, 2020Updated 5 years ago
- Ansible playbooks to install various utility and security tools to localhost☆12Apr 4, 2022Updated 3 years ago
- Using Amazon AWS S3 storage with iOS Swift App☆16Sep 29, 2015Updated 10 years ago
- mediasoup c++ server (SFU)☆15Jul 1, 2024Updated last year
- Use a USB card reader to cast videos to your chromecast☆16Feb 15, 2020Updated 6 years ago
- Modeling futexes in TLA+☆20Oct 6, 2024Updated last year
- Port of the xmr-stak-cpu monero miner to ppc64le☆18Mar 27, 2019Updated 6 years ago
- Image Steganography using QR-codes written in Python 3.7.☆12Mar 13, 2021Updated 4 years ago
- Docker image to run Pavlov VR Dedicated Server☆15Aug 9, 2021Updated 4 years ago