lowbyteproductions / Hiding-Data-In-Sound
Code for the "Hiding Data In Sound" video
☆11Updated 2 years ago
Alternatives and similar repositories for Hiding-Data-In-Sound
Users that are interested in Hiding-Data-In-Sound are comparing it to the libraries listed below
Sorting:
- Solutions of xchg rax,rax☆15Updated 4 years ago
- ☆19Updated 3 years ago
- The book and code repo for the FREE Fundamental C++ book by Kevin Thomas.☆18Updated 2 years ago
- Compiler for the Jack Programming Language☆17Updated 6 months ago
- Simple and efficient file shredding☆14Updated 5 years ago
- My attempt to teach others about microprocessors and programming in IA-32 and IA-64 assembly, and to spread the word of how awesome it is…☆29Updated 2 years ago
- Remake znanego wirusa Watykańczyka w C#☆20Updated 4 years ago
- This repository contains relevant samples and data related to "Malware Reverse Engineering for Beginners" articles.☆62Updated 3 years ago
- Windows Explorer application written in assembly☆14Updated last year
- My shellcodes (or shellcodish-things) written for educational purpose in NASM assembly.☆40Updated 9 months ago
- A port scanner written in PowerShell☆13Updated 4 years ago
- POC for a basic C2 server using the python aiohttp framework☆15Updated 5 years ago
- Detailed explanation of Windows cryptographic algorithms, with examples and schemes.☆18Updated 5 months ago
- An HTML page which is also a valid PDF file and JPEG image☆13Updated 3 months ago
- Basic guide for performing a Physical PenTest - Nist 800-12, 800-53, 800-115, 800-152☆19Updated 2 years ago
- This contains notes, slides, and code for my Infosec World talk☆19Updated last year
- Execute invisible JavaScript by abusing Hangul filler characters. Inspired by Martin Kleppe's INVISIBLE.js.☆11Updated 7 months ago
- Static Decryptor for IcedID Malware☆18Updated 2 years ago
- Various exploits for SerenityOS☆17Updated 3 years ago
- Local Privilege Escalation Miner☆27Updated 3 years ago
- Recursively extract urls from a web page for reconnaissance.☆12Updated 11 months ago
- A utility that can be used to launch an executable with a DLL injected☆19Updated last year
- Some of CrackMes made by me :)☆18Updated 3 years ago
- Distributed Nmap, wrapper around Nmap to allow distributed network enumeration.☆17Updated this week
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆18Updated 3 years ago
- ToyOS is a simple x86 OS that only accepts numeric values into the input stream and returns them to a standard out console.☆12Updated 3 years ago
- A small example of an assembly bootloader☆12Updated 3 years ago
- this repo is for red team process and tools collection☆23Updated 3 years ago
- Collection of structures, prototype and examples for Microsoft Macro Assembler (MASM) x64.☆16Updated 4 years ago
- Personal blog about cyber security and challenges☆19Updated last year