lowbyteproductions / Hiding-Data-In-SoundLinks
Code for the "Hiding Data In Sound" video
☆12Updated 2 years ago
Alternatives and similar repositories for Hiding-Data-In-Sound
Users that are interested in Hiding-Data-In-Sound are comparing it to the libraries listed below
Sorting:
- Solutions of xchg rax,rax☆15Updated 5 years ago
- My attempt to teach others about microprocessors and programming in IA-32 and IA-64 assembly, and to spread the word of how awesome it is…☆29Updated 2 years ago
- The book and code repo for the FREE Fundamental C++ book by Kevin Thomas.☆18Updated 2 years ago
- Simple and efficient file shredding☆14Updated 5 years ago
- Scriptable VSCode extension to generate or manipulate data. Stop pasting sensitive data in webpages.☆52Updated last year
- A port scanner written in PowerShell☆13Updated 4 years ago
- Master of Science in Cybersecurity, Sapienza University of Rome.☆50Updated 8 months ago
- Personal blog about cyber security and challenges☆18Updated last year
- Collection of ezine about virii☆17Updated 2 years ago
- x86-assembly-cheat-sheet: A must-have for quick reference in x86 Assembly. Covers fundamental concepts, instruction sets, & mem managemen…☆24Updated 9 months ago
- DC540 hacking challenge 0x00002 [MicroPython CTF].☆13Updated last year
- Compiler for the Jack Programming Language☆19Updated 8 months ago
- Beautify Nessus scan output☆11Updated last year
- POC for a basic C2 server using the python aiohttp framework☆15Updated 5 years ago
- A tool to embed files into images☆14Updated 4 years ago
- Mirror of my favourite hacking Zines for the lulz, nostalgy, and reference☆46Updated 5 years ago
- A Metamorphic virus 🌺☆15Updated 3 years ago
- Oceantoo is an XOR/LFSR based encryption algorithm☆16Updated 3 years ago
- Code for the Making WAVs video☆34Updated 4 years ago
- Scan and decode NetWire logs☆12Updated 2 years ago
- The Skull CTF, A mind-bending hardware puzzle in three acts☆15Updated 4 years ago
- It is a script written in Python that performs brute force on workers' payroll files through the use of their DNI (National Identity Docu…☆12Updated 4 years ago
- Some ELF Malwares☆10Updated 3 years ago
- DC540 hacking challenge 0x00005b.☆17Updated last year
- Encrypt your git repo...☆48Updated 3 years ago
- Personal notes☆10Updated 2 years ago
- this repo is for red team process and tools collection☆24Updated 3 years ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- 「💻」Simple kernel made in 16-bit assembly only☆16Updated 7 months ago
- This repository contains relevant samples and data related to "Malware Reverse Engineering for Beginners" articles.☆63Updated 3 years ago