This Project Describes the use of LSB Steganography, with a python program added to further implement it. I havn't writtent the algorithm but used "stegano", a python library to implement it.
☆12Dec 9, 2020Updated 5 years ago
Alternatives and similar repositories for LSB_Steganography
Users that are interested in LSB_Steganography are comparing it to the libraries listed below
Sorting:
- ☆19Sep 26, 2020Updated 5 years ago
- A steganography based shellcode hider to bypass AV☆17Aug 7, 2022Updated 3 years ago
- Saratov State University, CSIT. Discipline "cryptographic methods of information security" (криптографические методы защиты информации, r…☆15Jun 28, 2018Updated 7 years ago
- A python tool for sms bombing only Robi and Airtel numbers.☆13Feb 24, 2025Updated last year
- Doom para seus comentários do youtube quando a internet está ruim.☆13Feb 5, 2025Updated last year
- 🤘🤘🤘SMS BOMB FOR BANGLADESH(BD),INDIA,PAKISTAN,UK,MALAYSIA,ISREAL,PALEASTINE,🤘🤘🤘☆17Jun 5, 2021Updated 4 years ago
- Data Hiding in Image☆10Apr 9, 2020Updated 5 years ago
- Black Hat Tools write in python☆11Feb 23, 2023Updated 3 years ago
- API specification of the USB WiFi Monitor Android app☆25May 17, 2025Updated 9 months ago
- StegsnowBruteForcer — outil Python pour brute-force de mots de passe dans les documents.☆15Feb 17, 2026Updated 2 weeks ago
- add the charles ssl certificate to an android .apk file. Use that modified .apk to collect HTTP traffic.☆11Mar 21, 2023Updated 2 years ago
- Site responsivo de barbearia☆10Dec 10, 2020Updated 5 years ago
- 🏍Fast Home Delivery App of Grocery ,Medicines , Vegetables ,etc during lockdown . Client can send Handwritten List Photo ,Chat with Shop…☆11Jun 27, 2020Updated 5 years ago
- PST Parser using pypff - Export all email headers and body to csv or json☆10Nov 8, 2019Updated 6 years ago
- 利用Python编写的微信消息轰炸脚本☆10Mar 19, 2021Updated 4 years ago
- Improvised LSB Steganography technique using Pixel Locator Sequence with AES. Implementation for paper https://ieeexplore.ieee.org/abstra…☆11Apr 17, 2021Updated 4 years ago
- An image steganography with high embedding capacity based on a genetic algorithm☆11Nov 9, 2019Updated 6 years ago
- Steganography( LSB IMAGES ) using AES Cryptography together☆13Nov 7, 2014Updated 11 years ago
- 📧A disposable email client built with Flask. Need a temporary email? Look no further!☆16Sep 12, 2018Updated 7 years ago
- Update playlist☆22Updated this week
- This is bombing tool☆15Dec 1, 2023Updated 2 years ago
- WigleAPI-JSON in PHP with JSON Response☆14Nov 18, 2013Updated 12 years ago
- Implementation of Mercado Pago OAuth in Flask.☆10Feb 12, 2023Updated 3 years ago
- 💣СМС Бомбер от команды HZF💣☆13Feb 21, 2024Updated 2 years ago
- Automatic cloud backup of Kali Linux data☆13Feb 27, 2020Updated 6 years ago
- Demonstrate and showcasing how you can hide payload or secret message inside an image, audio, and PDF file and how an unethical person mi…☆12Jul 23, 2021Updated 4 years ago
- ☆17Nov 28, 2022Updated 3 years ago
- ☆22Jul 13, 2022Updated 3 years ago
- A keylogger that sends emails with log attachment - works on all OS☆11Oct 30, 2021Updated 4 years ago
- Slient-Doc-Pdf-Exploit-Builder-Fud-Malware-Cve☆15Jul 16, 2022Updated 3 years ago
- scripts to create zip bombs☆12Nov 26, 2012Updated 13 years ago
- The repository contains Criminal IP Asset Search data in STIX 2.1 JSON format, enabling a quick understanding of threat information for s…☆11Jan 29, 2024Updated 2 years ago
- Video Steganography for Piracy Prevention☆12Oct 16, 2016Updated 9 years ago
- This is a project for agency minimal website using pure HTML, CSS and JAVASCRIPT no framework or library, the website is full responvive.…☆10Oct 6, 2022Updated 3 years ago
- The NSE Script plugin integrates with Criminal IP CTI search engine for network scanning, showing IP details like WHOIS, running products…☆15Nov 29, 2023Updated 2 years ago
- Joint adjustment image steganography networks☆10Aug 3, 2023Updated 2 years ago
- CS3304 - Group C++ university Project creating an ATM machine software with use of encapsulation and inheritance.☆10Jun 4, 2023Updated 2 years ago
- Application Security Mind Maps☆11Apr 10, 2021Updated 4 years ago
- Cybersecurity Career Path☆12Jan 27, 2022Updated 4 years ago