syvaidya / openstego
OpenStego is a steganography application that provides two functionalities: a) Data Hiding: It can hide any data within an image file. b) Watermarking: Watermarking image files with an invisible signature. It can be used to detect unauthorized file copying.
☆1,216Updated last year
Alternatives and similar repositories for openstego:
Users that are interested in openstego are comparing it to the libraries listed below
- Least Significant Bit Steganography for bitmap images (.bmp and .png), WAV sound files, and byte sequences. Simple LSB Steganalysis (LSB …☆593Updated 4 months ago
- ☆617Updated last year
- Audio file steganography. Hides files or text inside audio files and retrieve them automatically☆272Updated last year
- A pure Python steganography module.☆539Updated last week
- Python program to steganography files into images using the Least Significant Bit.☆906Updated 2 years ago
- This is the development tree. Production downloads are at:☆1,162Updated last week
- UNMAINTAINED. USE AT OWN RISK. Stegdetect is an automated tool for detecting steganographic content in images.☆412Updated 6 years ago
- Yet another Stego Tool☆370Updated last year
- Software to identify the different types of hashes -☆1,361Updated 2 years ago
- Steganography brute-force utility to uncover hidden data inside files☆561Updated 4 years ago
- A framework for layer 2 attacks☆748Updated last year
- A steganalysis tool for detecting LSB steganography in images☆210Updated 6 years ago
- Universal steganographic tool☆281Updated 3 years ago
- A browser extension for OSINT search☆1,526Updated this week
- CloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based S…☆1,583Updated 4 years ago
- detect stegano-hidden data in PNG & BMP☆1,363Updated 10 months ago
- Metadata harvester☆1,079Updated 11 months ago
- oletools - python tools to analyze MS OLE2 files (Structured Storage, Compound File Binary Format) and MS Office documents, for malware a…☆2,988Updated last month
- Foremost is a console program to recover files based on their headers, footers, and internal data structures. This process is commonly re…☆323Updated last year
- Small utilities that are useful in advanced password cracking☆1,411Updated 7 months ago
- Lokinet is an anonymous, decentralized and IP based overlay network for the internet.☆1,833Updated this week
- CrackStation.net's Lookup Table Implementation.☆371Updated 6 years ago
- I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is …☆2,104Updated this week
- A braindead program for cracking encrypted ZIP archives. Forked from http://oldhome.schmorp.de/marc/fcrackzip.html☆449Updated last year
- Ncrack network authentication tool☆1,103Updated 10 months ago
- ☆3,515Updated 11 months ago
- Collection of steganography tools - helps with CTF challenges☆2,461Updated 2 years ago
- Enterprise Onion Toolkit☆780Updated last year
- CeWL is a Custom Word List Generator☆2,115Updated 3 months ago
- Medusa is a speedy, parallel, and modular, login brute-forcer.☆719Updated 2 weeks ago