samuelcouch / c-steganographyView external linksLinks
Read and write hidden messages in images
☆18Sep 20, 2016Updated 9 years ago
Alternatives and similar repositories for c-steganography
Users that are interested in c-steganography are comparing it to the libraries listed below
Sorting:
- MFT and USN parser that allows direct extraction in filesystem timeline format (mactime), dump all resident files in the MFT in their ori…☆13May 10, 2023Updated 2 years ago
- A 3D Slicer app for Android, for you to print on-the-go.☆11Feb 25, 2023Updated 2 years ago
- Files for the Defcon Toronto Introduction to 64-bit Linux Exploitation☆15Feb 23, 2018Updated 7 years ago
- MATLAB Implementation of Harmony Search, a nature inspired optimization algorithm☆10Dec 1, 2016Updated 9 years ago
- MIDI Synthesizer for Arduino☆10Dec 7, 2015Updated 10 years ago
- Homemade Mica material, only use Direct2D technology.☆14Jul 28, 2022Updated 3 years ago
- A repository for CTF writeups☆10Oct 8, 2016Updated 9 years ago
- BeamStalker is open-source firmware for esp based board designed for RF experimentation, encouraging collaboration and ethical exploratio…☆14May 11, 2025Updated 9 months ago
- Tool used for converting Linux Kernel time jiffies, from iptables xt_recent timestamps, to human datetime☆13Feb 16, 2021Updated 5 years ago
- A simple, DIY hardware password manager☆15Dec 8, 2013Updated 12 years ago
- A simple 2-field fuzzer for the telnet protocol☆11Apr 4, 2017Updated 8 years ago
- Midbar is more than just a password vault! Midbar is designed to significantly increase the cost of unauthorized access to its user's per…☆12May 19, 2024Updated last year
- Tool for decrypting files encrypted by the SynoLocker ransomware☆15Aug 22, 2014Updated 11 years ago
- Git repository to browse the XNU releases from☆10Sep 20, 2021Updated 4 years ago
- A kernel module that lists all current tasks in a Linux system☆15Dec 13, 2015Updated 10 years ago
- Multi-themes for refined☆14May 18, 2020Updated 5 years ago
- Sample usage of the libdxg projects.☆14Jan 29, 2026Updated 2 weeks ago
- Whale FM archive, data☆16Mar 4, 2015Updated 10 years ago
- Check for HTTP Security Headers☆14Aug 17, 2015Updated 10 years ago
- A Proof of Concept (PoC) IRC backdoor written in Python☆11Jan 29, 2021Updated 5 years ago
- Assembly/Shellcode☆14Oct 28, 2014Updated 11 years ago
- GDB scripts☆14Nov 30, 2012Updated 13 years ago
- Portable C Compiler (CVS mirror)☆12Apr 9, 2012Updated 13 years ago
- PoC attack server for CVE-2015-7547 buffer overflow vulnerability in glibc DNS stub resolver (public version)☆10Apr 25, 2016Updated 9 years ago
- .NET is a cross-platform runtime for cloud, mobile, desktop, and IoT apps.☆11Aug 24, 2023Updated 2 years ago
- Scan IPv4 prefixes for DNS revolvers and classify them as open/closed☆10Jun 19, 2014Updated 11 years ago
- Nextcloud monitor WearOS app☆11Nov 10, 2023Updated 2 years ago
- A set of tools to work with cgroup tree and process classification/QoS according to it☆10Oct 1, 2019Updated 6 years ago
- Test program to help spoof and mimic different wifi drones☆15Jul 29, 2024Updated last year
- ☆11Nov 12, 2025Updated 3 months ago
- PoC Reverse Text segment ELF File infector☆14Feb 28, 2020Updated 5 years ago
- Photo forensics tool that detects alteration of JPEG images☆10May 13, 2021Updated 4 years ago
- Musings from the brainpan.☆10Jan 8, 2019Updated 7 years ago
- CTF Writeups☆10Nov 7, 2016Updated 9 years ago
- Examples of programs written in several languages☆11Apr 18, 2023Updated 2 years ago
- Transform dumped executable memory back into an identical match from disk. Use network or local database to de-locate relocated binaries…☆12Jan 10, 2016Updated 10 years ago
- OpenHCL Linux Kernel☆18Updated this week
- Implementations of most commonly used algorithms in various languages. Thanks a ton to the wiki's which provided pesudo codes☆17May 3, 2014Updated 11 years ago
- GitHub Pages powered by ~Octopress~ ME !☆10Aug 2, 2025Updated 6 months ago