Euli is not a computer game but a tool which helps you set up a real life treasure hunt
☆44Feb 6, 2021Updated 5 years ago
Alternatives and similar repositories for euli_treasure_hunt
Users that are interested in euli_treasure_hunt are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆12Apr 20, 2017Updated 8 years ago
- Video Steganography for Piracy Prevention☆12Oct 16, 2016Updated 9 years ago
- An effective menu driven GUI made using Tkinter which takes in an image and returns a new image with the text data encoded in the pixels.☆10Oct 3, 2023Updated 2 years ago
- Hide files and data in plain ascii text that is invisible to the naked eye☆18Feb 10, 2015Updated 11 years ago
- Image Steganography using QR-codes written in Python 3.7.☆12Mar 13, 2021Updated 5 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- ✨Encoding text messages✍🏻 within images🖼 and videos📽✨☆15Nov 13, 2020Updated 5 years ago
- steganography project for rowdy hacks 2019 hackathon☆20Dec 28, 2021Updated 4 years ago
- Very simple frequency domain(FFT based) image steganography/waterprint/signature. https://www.zhihu.com/question/50735753/answer/12259327…☆24Jun 9, 2020Updated 5 years ago
- ☆29Apr 7, 2022Updated 3 years ago
- Hide data in plaintext☆16Mar 25, 2019Updated 7 years ago
- CIS 4110 Comparison of Image Steganography Techniques (DCT vs LSB)☆19Jan 9, 2020Updated 6 years ago
- Random scripts for log mining, intel gathering, network querying, and other incident response-ish activities☆16Sep 13, 2022Updated 3 years ago
- Ghosting-AMSI☆18Apr 30, 2025Updated 11 months ago
- Automated Image Forgery Detection through Classification of JPEG Ghosts☆12Oct 3, 2023Updated 2 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- digital image steganography using BPCS (Bit-Plane Complexity Segmentation Steganography)☆32Aug 15, 2024Updated last year
- IRMA brain☆21Nov 28, 2016Updated 9 years ago
- ☆18Mar 26, 2025Updated last year
- The web site☆15Apr 12, 2023Updated 2 years ago
- Parse a PowerPoint PPTX file, extracting all URL's from notes and slides, and test for validity☆29Apr 4, 2025Updated 11 months ago
- Different DFIR and CTI utilities☆39May 13, 2020Updated 5 years ago
- Under Your Radar (UYR): Exfiltration using Steganography☆18Mar 28, 2015Updated 11 years ago
- Quickly start a temporary container and go into the container's terminal. Easy to remember!☆16Jul 30, 2023Updated 2 years ago
- A Dockerized Ghidra Server☆15Jan 9, 2021Updated 5 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- A streamlined way to create STIX documents!☆31Apr 30, 2014Updated 11 years ago
- Python package to encode THREE QR codes into ONE.☆11Jun 14, 2022Updated 3 years ago
- StegsnowBruteForcer — outil Python pour brute-force de mots de passe dans les documents.☆15Feb 17, 2026Updated last month
- VB Exe Parser is an IDA script written in Python. This script will help you to parse VB program internal structures. It can find: Event, …☆17Oct 8, 2016Updated 9 years ago
- ☆22Apr 16, 2017Updated 8 years ago
- ☆12Mar 25, 2020Updated 6 years ago
- Splicing image forgery detection based on DCT and Local Binary Pattern☆10Apr 30, 2020Updated 5 years ago
- SteCoSteg is OutGuess successor and Vernam cipher analog in steganography.☆56Feb 16, 2019Updated 7 years ago
- Docker image to run shairport-sync on a Raspberry Pi☆12Apr 11, 2019Updated 6 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Peap Bomb is a password sprayer for WPA/WPA2 enterprise wireless that is leveraging PEAP for Authentication.☆10Feb 18, 2021Updated 5 years ago
- A modular framework and program for synchronous pwning with ssh, powered by Python 3, for educational and controlled penetration testing…☆10Sep 4, 2016Updated 9 years ago
- Generate a report with charts and statistics about cracked passwords in XLSX format☆36Dec 4, 2025Updated 3 months ago
- 🤘🤘🤘SMS BOMB FOR BANGLADESH(BD),INDIA,PAKISTAN,UK,MALAYSIA,ISREAL,PALEASTINE,🤘🤘🤘☆17Jun 5, 2021Updated 4 years ago
- Steganography( LSB IMAGES ) using AES Cryptography together☆13Nov 7, 2014Updated 11 years ago
- Helps you saving your mail attachments (e.g. epub-files, PDFs) to a temporary directory, convert the files to MOBI-format and send them d…☆14Feb 24, 2019Updated 7 years ago
- Stores email header and body information in JSON format☆12Mar 10, 2016Updated 10 years ago