Hide files and data in plain ascii text that is invisible to the naked eye
☆18Feb 10, 2015Updated 11 years ago
Alternatives and similar repositories for ascii-steganography
Users that are interested in ascii-steganography are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Final year undergraduate project - embedding secret messages into a live video stream, transmitting the stream, and extracting the messag…☆12Mar 27, 2017Updated 9 years ago
- An effective menu driven GUI made using Tkinter which takes in an image and returns a new image with the text data encoded in the pixels.☆10Oct 3, 2023Updated 2 years ago
- temporarily change the displayed video mode☆12Nov 30, 2017Updated 8 years ago
- Image Steganography using QR-codes written in Python 3.7.☆12Mar 13, 2021Updated 5 years ago
- steganography project for rowdy hacks 2019 hackathon☆20Dec 28, 2021Updated 4 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- example of a wiiu function patcher☆16Oct 30, 2017Updated 8 years ago
- The EMV QR Code Decoder Library is a Kotlin-based utility that decodes EMV QR codes into structured data. It provides classes and enums t…☆12Apr 13, 2024Updated 2 years ago
- The objective of Smart File Hunter (SFH) is the efficient identification of files containing sensitive information like passwords or priv…☆14Sep 3, 2022Updated 3 years ago
- Discord rich presence integration for Smash 4 Wii U☆14Mar 4, 2018Updated 8 years ago
- IPC Logger for the Switch☆15Aug 7, 2019Updated 6 years ago
- ☆15Mar 2, 2014Updated 12 years ago
- Automated Image Forgery Detection through Classification of JPEG Ghosts☆12Oct 3, 2023Updated 2 years ago
- digital image steganography using BPCS (Bit-Plane Complexity Segmentation Steganography)☆32Aug 15, 2024Updated last year
- Saratov State University, CSIT. Discipline "cryptographic methods of information security" (криптографические методы защиты информации, r…☆15Jun 28, 2018Updated 7 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- scripts to create zip bombs☆12Nov 26, 2012Updated 13 years ago
- A platform for New Super Mario Bros. U code mods.☆32Feb 12, 2026Updated 2 months ago
- Custom reimplementation of LogManager service, redirecting logs to SD card☆10Apr 27, 2020Updated 5 years ago
- yes! it's here!☆14May 9, 2018Updated 7 years ago
- Under Your Radar (UYR): Exfiltration using Steganography☆18Mar 28, 2015Updated 11 years ago
- Interactive hacking toolkit.☆14Oct 17, 2018Updated 7 years ago
- reverse engineering random malwares☆23Mar 12, 2026Updated last month
- Euli is not a computer game but a tool which helps you set up a real life treasure hunt☆44Feb 6, 2021Updated 5 years ago
- ☆12Jul 15, 2022Updated 3 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Porting of Cloudberry Kingdom from the original C# XNA code, running on Xbox and PC, to C++ for Wii U, Playstation, Mac, Linux.☆10Aug 10, 2016Updated 9 years ago
- Data exfiltration using covert channels in the TCP/IP protocol with some basic steganography.☆12Apr 19, 2017Updated 9 years ago
- A project created for an AR-VR elective course in Sem 5☆12Dec 11, 2020Updated 5 years ago
- Ini adalah kumpulan webshell atau backdoor yang lengkap☆18Aug 18, 2024Updated last year
- Python package to encode THREE QR codes into ONE.☆11Jun 14, 2022Updated 3 years ago
- Flask website for implementation of paper on text-based steganography i.e. hiding a secret message in a cover message and sending it over…☆29Feb 28, 2021Updated 5 years ago
- Logfiles from testing with real cars☆16Nov 26, 2025Updated 4 months ago
- Chocolate Doom is a Doom source port that is conservative and historically accurate.☆12Feb 24, 2024Updated 2 years ago
- Splicing image forgery detection based on DCT and Local Binary Pattern☆10Apr 30, 2020Updated 5 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A webhook bridge to send messages on Discord through a webpage☆14Apr 11, 2026Updated last week
- A WIP desktop gui for the Homebrew Appstore☆19Oct 7, 2019Updated 6 years ago
- Training pretrained deep neural network, Xception Net, with Face Forensics ++ Dataset, and implement two different losses to learn image …☆10Apr 29, 2020Updated 5 years ago
- SteCoSteg is OutGuess successor and Vernam cipher analog in steganography.☆56Feb 16, 2019Updated 7 years ago
- Researching NCM reimplementation for the Nintendo Switch☆10Jul 25, 2019Updated 6 years ago
- Unlocking the Nintendo Switch's hidden browser. Set DNS to 104.236.216.051.☆16Mar 4, 2017Updated 9 years ago
- Peap Bomb is a password sprayer for WPA/WPA2 enterprise wireless that is leveraging PEAP for Authentication.☆10Feb 18, 2021Updated 5 years ago