m13253 / lvdo
Video steganography implementation
☆99Updated 7 years ago
Alternatives and similar repositories for lvdo:
Users that are interested in lvdo are comparing it to the libraries listed below
- Play audio files (.wav) via the system bus of your computer and pickup with an AM radio☆52Updated last year
- FUSE-based bittorrent file system (also called torrentfs or torrent filesystem) for streaming content directly from the internets.☆71Updated 13 years ago
- A partial Onion Proxy implementation that's designed to build single-hop circuits through Tor exit nodes☆142Updated 9 years ago
- Forban is a p2p application for link-local and local area networks. Forban works independently from the Internet and uses only the local…☆135Updated 9 years ago
- Allow for binary files to be converted to Youtube videos on Windows. Ported from LVDO.☆47Updated 9 years ago
- Recover files using lists of blocks hashes, bypassing the File System entirely☆51Updated 6 years ago
- Tor Browser and Tails version fingerprint PoC☆136Updated 6 years ago
- Some code to bruteforce OpenBSD softraid encrypted drives - NOT A READY-TO-USE TOOL☆59Updated 8 years ago
- Peer-to-peer IPv6 networking, secure and near-zero-conf.☆153Updated 8 years ago
- Data over audio☆82Updated 6 years ago
- This code asks the user to enter fifty 4-digit PINs, each 5 times, and saves the PINs and their sensor measurements (motion and orientati…☆12Updated 8 years ago
- IP Over QR Code Tunnel☆198Updated 8 years ago
- The Hyperboria peering device☆140Updated 9 years ago
- Privacy enhanced instant messenger☆44Updated 5 years ago
- Cross platform commotion client for computers. - CURRENTLY IN ACTIVE DEVELOPMENT☆34Updated 10 years ago
- Various cryptographic backdoors and tools to detect them☆21Updated 9 years ago
- This is a mini-firewall that completely isolates a target device from the local network.☆305Updated 11 years ago
- (Deprecated PoC) Innovative censorship evading technology based on p2p distributed caching network☆58Updated 8 years ago
- Hyperboria (CJDNS network) map☆63Updated 5 years ago
- Whitelist Tor exit relays to allowing Tor users access your CloudFlare-protected site without CAPTCHA's☆62Updated 8 years ago
- in FPGA☆16Updated 9 years ago
- Where a Linux sys-admin's perinoid scripts are collected.☆10Updated 9 years ago
- A JPEG Error Level Analysis forensic plugin for the GNU Image Manipulation Program (GIMP)☆70Updated 6 years ago
- Blucat (netcat for Bluetooth)☆72Updated 5 years ago
- Website if using 0net locally:☆39Updated 9 years ago
- Bram's steganographic framework☆489Updated 10 years ago
- voodoo networking: post-VPN session obfuscation for a post-Snowden world☆34Updated 6 years ago
- Fernvale research OS☆25Updated 9 years ago
- The "State considered harmful" paper☆105Updated 9 years ago
- A Camouflage Proxy for the Tor Anonymity System☆79Updated 9 years ago