sniperline047 / Audio-Steganography-CLIView external linksLinks
A Python-based Command Line Interface for encoding and decoding secret messages within audio files using various steganography algorithms. Supports Standard LSB, Enhanced LSB (with and without flipping), and provides accuracy calculation for decoded messages.
☆22Sep 1, 2024Updated last year
Alternatives and similar repositories for Audio-Steganography-CLI
Users that are interested in Audio-Steganography-CLI are comparing it to the libraries listed below
Sorting:
- Steganography is data hidden within data. Steganography is an encryption technique that can be used along with cryptography as an extra-s…☆22Mar 16, 2017Updated 8 years ago
- ☆15Jun 26, 2023Updated 2 years ago
- Applying Steganography followed by Visual Cryptography Encode and Decode data☆17Oct 3, 2023Updated 2 years ago
- Saratov State University, CSIT. Discipline "cryptographic methods of information security" (криптографические методы защиты информации, r…☆15Jun 28, 2018Updated 7 years ago
- 自动刷 Anyview 的脚本。☆10Oct 15, 2024Updated last year
- Neural Linguistic Steganography via Self-Adjusting Arithmetic Coding in EMNLP 2020☆24Oct 1, 2020Updated 5 years ago
- Spectrogram is selected as preprocessing feature of audio clips and a feature representation method based on deep residual network (Spec-…☆26Sep 13, 2020Updated 5 years ago
- ☆14Apr 23, 2019Updated 6 years ago
- Python Implementation of Pixel Value Differencing based Steganography (LSB) - PNG Cover Images☆22Jun 25, 2022Updated 3 years ago
- Computer vision and IOT based project for Underwater Garbage Detection and collection☆11Aug 23, 2020Updated 5 years ago
- 基于Numpy和Boost::Python实现的矩量法☆10Aug 31, 2018Updated 7 years ago
- Data Hiding in Image☆10Apr 9, 2020Updated 5 years ago
- The official code repository for our TGRS paper "DiffusionEMIS: Diffusion Model for 3D Electromagnetic Inverse Scattering".☆16Mar 18, 2024Updated last year
- This repository gives the codes for "Fast ground penetrating radar dual parameters full waveform inversion method accelerated by hybrid c…☆18Jan 8, 2026Updated last month
- 📧A disposable email client built with Flask. Need a temporary email? Look no further!☆16Sep 12, 2018Updated 7 years ago
- Hey Gamer, show everyone your favorite skills!🎮☆15Jul 16, 2025Updated 7 months ago
- StegsnowBruteForcer — outil Python pour brute-force de mots de passe dans les documents.☆15Aug 7, 2025Updated 6 months ago
- 利用Python编写的微信消息轰炸脚本☆10Mar 19, 2021Updated 4 years ago
- This is bombing tool☆15Dec 1, 2023Updated 2 years ago
- Essential tools for security, easily install with scoop☆14Updated this week
- ☆13Dec 18, 2024Updated last year
- A keylogger that sends emails with log attachment - works on all OS☆11Oct 30, 2021Updated 4 years ago
- Easy handle DPlayer-Lite or DPlayer on WordPress. A shortcode for WordPress to using DPlayer.☆12Jan 3, 2020Updated 6 years ago
- Subsurface Pipes Detection Using DNN-based Back Projection on gprMax Data☆10Jan 19, 2021Updated 5 years ago
- Final year undergraduate project - embedding secret messages into a live video stream, transmitting the stream, and extracting the messag…☆12Mar 27, 2017Updated 8 years ago
- Method of moment with RWG basis function☆12Mar 22, 2016Updated 9 years ago
- ☆22Jul 13, 2022Updated 3 years ago
- 哔哩CDN:公益性的jsdelivr镜像源☆14Mar 29, 2025Updated 10 months ago
- LilCTF 2025 challenges, source code, official writeups, and players' writeups.☆27Oct 10, 2025Updated 4 months ago
- Video Steganography for Piracy Prevention☆12Oct 16, 2016Updated 9 years ago
- scripts to create zip bombs☆12Nov 26, 2012Updated 13 years ago
- Code for reconstructing the object domain contrast function using Born Approximation in inverse scattering problem☆13Jul 30, 2020Updated 5 years ago
- Joint adjustment image steganography networks☆10Aug 3, 2023Updated 2 years ago
- OBS 视频分块重映射插件☆10Sep 16, 2023Updated 2 years ago
- 少年,你想不想……『加速』到更快的境界?成为 Burst Linker 吧!和我一起刷完 Welearn!(WeLearn 刷课刷时长脚本/程序)☆31Dec 21, 2025Updated last month
- breast cancer detection using cnn (DL) & apply model at web app☆10Oct 3, 2021Updated 4 years ago
- Steganography in Twitter using retweets☆12Jun 19, 2022Updated 3 years ago
- Electromagnetics codes to compute radiative heat transfer, Green's functions, and reflection/transmission for multilayer structures☆11Nov 1, 2013Updated 12 years ago
- Under Your Radar (UYR): Exfiltration using Steganography☆18Mar 28, 2015Updated 10 years ago