m13253 / lvdoLinks
Video steganography implementation
☆100Updated 8 years ago
Alternatives and similar repositories for lvdo
Users that are interested in lvdo are comparing it to the libraries listed below
Sorting:
- Play audio files (.wav) via the system bus of your computer and pickup with an AM radio. See youtube link for example.☆52Updated 2 years ago
- Recover files using lists of blocks hashes, bypassing the File System entirely☆50Updated 7 years ago
- Allow for binary files to be converted to Youtube videos on Windows. Ported from LVDO.☆48Updated 10 years ago
- IP Over QR Code Tunnel☆199Updated 9 years ago
- A program to send Ethernet PAUSE frames☆36Updated 9 years ago
- SilverEdge Inc. SilverPush Demo Apps (unmasked)☆86Updated 10 years ago
- FUSE-based bittorrent file system (also called torrentfs or torrent filesystem) for streaming content directly from the internets.☆72Updated 14 years ago
- Magnet to Torrent converter webservice☆61Updated 5 years ago
- Encrypted P2P chat over ICMP.☆79Updated 10 years ago
- Data over audio☆84Updated 7 years ago
- Some code to bruteforce OpenBSD softraid encrypted drives - NOT A READY-TO-USE TOOL☆58Updated 9 years ago
- Remote FUSE filesystem via server-side script☆65Updated 11 years ago
- Process restart in linux☆158Updated 13 years ago
- Generate credentials for Opera's "browser VPN"☆253Updated 8 years ago
- https://git.gir.st/base65536.git - Seldomly Updated Mirror: Unicode's answer to Base64 for the UNIX command line☆22Updated 7 years ago
- ☆153Updated 8 years ago
- Open IP cameras in IPv4☆144Updated 9 years ago
- Browser Shell☆124Updated 2 years ago
- in FPGA☆16Updated 10 years ago
- tox dns server☆43Updated 10 years ago
- Detect claps from your computer's microphone and act on them.☆11Updated 3 years ago
- Tor Browser and Tails version fingerprint PoC☆137Updated 7 years ago
- Provably Anonymous Overlay☆325Updated 11 years ago
- Dynamic Visual Debugging / Reverse Engineering Toolsuite☆251Updated 6 years ago
- A Polymorphic Engine for Filtering-Resistant Transport Protocols☆289Updated 2 years ago
- Where a Linux sys-admin's perinoid scripts are collected.☆10Updated 10 years ago
- A Camouflage Proxy for the Tor Anonymity System☆88Updated 10 years ago
- Make PGP messages and signatures more interesting☆496Updated 2 years ago
- The "Intel x86 considered harmful" paper☆200Updated 10 years ago
- The Hyperboria peering device☆140Updated 9 years ago