Saratov State University, CSIT. Discipline "cryptographic methods of information security" (криптографические методы защиты информации, rus)
☆15Jun 28, 2018Updated 7 years ago
Alternatives and similar repositories for cryptographic_methods
Users that are interested in cryptographic_methods are comparing it to the libraries listed below
Sorting:
- A python tool for sms bombing only Robi and Airtel numbers.☆13Feb 24, 2025Updated last year
- 🤘🤘🤘SMS BOMB FOR BANGLADESH(BD),INDIA,PAKISTAN,UK,MALAYSIA,ISREAL,PALEASTINE,🤘🤘🤘☆17Jun 5, 2021Updated 4 years ago
- Distributes web framework.☆18Oct 10, 2014Updated 11 years ago
- Data Hiding in Image☆10Apr 9, 2020Updated 5 years ago
- PST Parser using pypff - Export all email headers and body to csv or json☆10Nov 8, 2019Updated 6 years ago
- StegsnowBruteForcer — outil Python pour brute-force de mots de passe dans les documents.☆15Feb 17, 2026Updated last week
- Steganography( LSB IMAGES ) using AES Cryptography together☆13Nov 7, 2014Updated 11 years ago
- Improvised LSB Steganography technique using Pixel Locator Sequence with AES. Implementation for paper https://ieeexplore.ieee.org/abstra…☆11Apr 17, 2021Updated 4 years ago
- This is bombing tool☆15Dec 1, 2023Updated 2 years ago
- An image steganography with high embedding capacity based on a genetic algorithm☆11Nov 9, 2019Updated 6 years ago
- 利用Python编写的微信消息轰炸脚本☆10Mar 19, 2021Updated 4 years ago
- 📧A disposable email client built with Flask. Need a temporary email? Look no further!☆16Sep 12, 2018Updated 7 years ago
- This Project Describes the use of LSB Steganography, with a python program added to further implement it. I havn't writtent the algorithm…☆12Dec 9, 2020Updated 5 years ago
- In Attempt to solve Cicada 3301 Puzzle by myself☆15Aug 6, 2018Updated 7 years ago
- Perl wrapper for the capstone library☆13Mar 7, 2017Updated 8 years ago
- 💣СМС Бомбер от команды HZF💣☆13Feb 21, 2024Updated 2 years ago
- Capstone disassembly framework: Core + Python + Ocaml + Java + C# bindings☆18Jan 25, 2014Updated 12 years ago
- Cordova地图插件(在原插件基础上纠正了国内定位精度不高的问题)☆11Aug 28, 2021Updated 4 years ago
- scripts to create zip bombs☆12Nov 26, 2012Updated 13 years ago
- Joint adjustment image steganography networks☆10Aug 3, 2023Updated 2 years ago
- A wrapper of overture for shadowsocks-android☆10Apr 7, 2017Updated 8 years ago
- Capstone disassembly/disassembler framework: Core (Arm, Arm64, Mips, PPC, Sparc, SystemZ, X86, X86_64, XCore) + bindings (Python, Java, O…☆11Jul 3, 2018Updated 7 years ago
- Python Steganography data hiding in image☆10Dec 25, 2021Updated 4 years ago
- ☆22Jul 13, 2022Updated 3 years ago
- Automating the boring stego work for you..☆13Feb 26, 2019Updated 7 years ago
- - Anonymous E-Mail sending. - E-Mail bombing without logging in. - Sms bombing by victim no.☆10Oct 21, 2023Updated 2 years ago
- A keylogger that sends emails with log attachment - works on all OS☆11Oct 30, 2021Updated 4 years ago
- 二维码生成接口,可以定制内容、尺寸、前景色、背景色及透明度☆11Jan 25, 2019Updated 7 years ago
- FreeBASIC is a completely free, open-source, multi-platform BASIC compiler, with syntax similar to MS-QuickBASIC, that adds new features …☆10Apr 7, 2024Updated last year
- cocos2d hook script base on frida☆16Jun 6, 2024Updated last year
- Final year undergraduate project - embedding secret messages into a live video stream, transmitting the stream, and extracting the messag…☆12Mar 27, 2017Updated 8 years ago
- Android Java and native hook Demo☆13Jun 20, 2017Updated 8 years ago
- MapleShark is a MapleStory sniffer that works with SharpPcap. Sniff dem packetzz!☆10Feb 13, 2020Updated 6 years ago
- aria2 integration extension for Chrome☆13Mar 2, 2018Updated 8 years ago
- Video Steganography for Piracy Prevention☆12Oct 16, 2016Updated 9 years ago
- get rid of repeat☆11Jun 29, 2022Updated 3 years ago
- A modular framework and program for synchronous pwning with ssh, powered by Python 3, for educational and controlled penetration testing…☆10Sep 4, 2016Updated 9 years ago
- Linux kernel level keylogger that uses Twitter as a covert channel to get information of keystrokes and user data into the attacker using…☆11Jan 20, 2023Updated 3 years ago
- ☆11Apr 3, 2020Updated 5 years ago