m13253 / lvdo
Video steganography implementation
☆98Updated 7 years ago
Alternatives and similar repositories for lvdo:
Users that are interested in lvdo are comparing it to the libraries listed below
- Play audio files (.wav) via the system bus of your computer and pickup with an AM radio☆52Updated last year
- This code asks the user to enter fifty 4-digit PINs, each 5 times, and saves the PINs and their sensor measurements (motion and orientati…☆12Updated 7 years ago
- Recover files using lists of blocks hashes, bypassing the File System entirely☆51Updated 5 years ago
- Allow for binary files to be converted to Youtube videos on Windows. Ported from LVDO.☆46Updated 9 years ago
- A Polymorphic Engine for Filtering-Resistant Transport Protocols☆287Updated last year
- tox dns server☆43Updated 9 years ago
- A Camouflage Proxy for the Tor Anonymity System☆79Updated 9 years ago
- Bunny is a wireless. meshing, darknet that uses 802.11 to hide its communications☆930Updated 9 years ago
- Various cryptographic backdoors and tools to detect them☆21Updated 9 years ago
- googleusercontent.com as HTTP(S) proxy☆54Updated 4 years ago
- IP Over QR Code Tunnel☆197Updated 8 years ago
- A partial Onion Proxy implementation that's designed to build single-hop circuits through Tor exit nodes☆141Updated 9 years ago
- Dynamic Visual Debugging / Reverse Engineering Toolsuite☆249Updated 5 years ago
- This is a mini-firewall that completely isolates a target device from the local network.☆304Updated 11 years ago
- A collection of steganography tools.☆15Updated 4 years ago
- Hide secret information in typographical errors☆32Updated 9 years ago
- Forban is a p2p application for link-local and local area networks. Forban works independently from the Internet and uses only the local…☆134Updated 8 years ago
- Data over audio☆82Updated 6 years ago
- This repository contains firmware for the OneRNG entropy generator☆49Updated 9 years ago
- some core unix utils with focus on simplicity and ability to build standalone.☆40Updated last year
- Looking inside the (Drop) box. Security Analysis of Dropbox. Updated WOOT '13 paper and other goodies.☆327Updated 4 years ago
- Bruteforces [.onion] domains☆80Updated 9 years ago
- Some code to bruteforce OpenBSD softraid encrypted drives - NOT A READY-TO-USE TOOL☆58Updated 8 years ago