user163 / image-encryption
Encryption / Decryption of images with AES-CBC/ECB
☆18Updated 4 years ago
Alternatives and similar repositories for image-encryption:
Users that are interested in image-encryption are comparing it to the libraries listed below
- Some network covert channel projects of my own research, containing a protocol channel tool (protocol switching covert channel, PCT/PSCC)…☆16Updated 3 weeks ago
- A free online class on network information hiding/steganography/covert channels.☆99Updated last week
- ☆34Updated 2 years ago
- ☆21Updated 4 years ago
- ☆89Updated 3 months ago
- ☆24Updated last year
- QUICforge is an experimental python tool for request forgery attacks with QUIC☆22Updated 2 years ago
- ☆30Updated 2 years ago
- A collection of academic papers / Git repos / conference talks / frameworks / tools related to cellular security and privacy.☆136Updated last month
- Public datasets of malware and benign executable files (Windows EXE files). The dataset can be used by cybersecurity researchers focusing…☆23Updated last year
- Malware detection using CNN☆12Updated 6 years ago
- Linux Malware Sample Archive including various types of malicious ELF binaries and viruses. Be careful!☆165Updated 4 years ago
- Raspbian with OP-TEE support.☆26Updated 6 years ago
- A list of attacks or malware using steganography or information hiding☆63Updated last year
- My own collection about Linux kernel exploitation including CVEs, CTF challenges, papers and all other interesting things : )☆63Updated 9 months ago
- 2018年全国大学生信息 安全竞赛作品赛一等奖☆29Updated 2 months ago
- A curated dataset of malware and benign Windows executable samples for malware researchers☆44Updated 6 months ago
- Breaking Confidential VMs with Malicious Interrupts (USENIX Security 2024)☆30Updated 11 months ago
- A system which has a real-time & light-weight anomaly detection algorithm based on streaming data from UAV sensors in to order to get the…☆9Updated 5 years ago
- SHERLOC: Secure and Holistic Control-Flow Violation Detection on Embedded Systems☆16Updated last year
- A large-scale database of malicious software images☆47Updated 3 years ago
- The report of a supervised classifier to detect malware in TLS traffic☆21Updated 5 years ago
- NLP model and tech for cyber security tasks☆87Updated 2 years ago
- BLEDiff is an automated, scalable, property-agnostic, and black-box protocol noncompliance checker for BLE devices.☆12Updated 2 years ago
- MEGR-APT: A Memory-Efficient APT Hunting System Based on Attack Representation Learning☆42Updated 2 months ago
- Rust Linux Kernel Module designed for LKM rootkit detection☆40Updated last month
- An Open and Cross-platform Trusted Execution Environment.☆147Updated 7 months ago
- List of (automatic) protocol reverse engineering tools for network protocols☆160Updated 11 months ago
- ☆73Updated last year
- ☆14Updated 2 years ago