m13253 / lvdo
Video steganography implementation
☆99Updated 7 years ago
Alternatives and similar repositories for lvdo:
Users that are interested in lvdo are comparing it to the libraries listed below
- Allow for binary files to be converted to Youtube videos on Windows. Ported from LVDO.☆47Updated 9 years ago
- Play audio files (.wav) via the system bus of your computer and pickup with an AM radio☆52Updated last year
- Provably Anonymous Overlay☆324Updated 10 years ago
- Dynamic Visual Debugging / Reverse Engineering Toolsuite☆252Updated 6 years ago
- Recover files using lists of blocks hashes, bypassing the File System entirely☆51Updated 6 years ago
- A Polymorphic Engine for Filtering-Resistant Transport Protocols☆289Updated 2 years ago
- This code asks the user to enter fifty 4-digit PINs, each 5 times, and saves the PINs and their sensor measurements (motion and orientati…☆12Updated 8 years ago
- ent is a small, fast command line utility, plotting various entropy related metrics of files or pipe/stdin streams☆74Updated 5 years ago
- Some code to bruteforce OpenBSD softraid encrypted drives - NOT A READY-TO-USE TOOL☆59Updated 8 years ago
- IP Over QR Code Tunnel☆199Updated 8 years ago
- tox dns server☆44Updated 9 years ago
- FUSE-based bittorrent file system (also called torrentfs or torrent filesystem) for streaming content directly from the internets.☆71Updated 13 years ago
- C library that implements the OTR protocol.☆61Updated 8 years ago
- https://git.gir.st/base65536.git - Seldomly Updated Mirror: Unicode's answer to Base64 for the UNIX command line☆21Updated 6 years ago
- some codes and notes about the backdoor listening on TCP-32764 in linksys WAG200G.☆1,286Updated 6 years ago
- ☆56Updated 6 years ago
- Chrome address spoofing vulnerability proof-of-concept for HTTPS. (Original by David Leo.)☆209Updated 9 years ago
- A partial Onion Proxy implementation that's designed to build single-hop circuits through Tor exit nodes☆144Updated 9 years ago
- Bunny is a wireless. meshing, darknet that uses 802.11 to hide its communications☆930Updated 9 years ago
- Hide secret information in typographical errors☆32Updated 9 years ago
- The Hyperboria peering device☆140Updated 9 years ago
- Remote frame injection PoC by exploiting a standard compliant A-MPDU aggregation vulnerability in 802.11n networks.☆275Updated 9 years ago
- Heavy guns (gdb) for unmounting volumes.☆10Updated 5 years ago
- Cryptsetup with Deniable LUKS header crypto extension 🇺🇦 SUPPORT UKRAINE! 🇺🇦☆64Updated 5 years ago
- This is a mini-firewall that completely isolates a target device from the local network.☆306Updated 11 years ago
- Tor Browser and Tails version fingerprint PoC☆136Updated 6 years ago
- Encrypted P2P chat over ICMP.☆80Updated 9 years ago
- Forban is a p2p application for link-local and local area networks. Forban works independently from the Internet and uses only the local…☆135Updated 9 years ago
- Decentralized opsec panic button operating over UDP broadcasts and HTTP. Provides automatic ejection of encrypted drives as a safe-measur…☆225Updated 3 years ago
- Allows multiplexing access to webcams such that more than one application can read video from a single piece of hardware at a time.☆37Updated 2 years ago