51 skills found · Page 1 of 2
syvaidya / OpenstegoOpenStego is a steganography application that provides two functionalities: a) Data Hiding: It can hide any data within an image file. b) Watermarking: Watermarking image files with an invisible signature. It can be used to detect unauthorized file copying.
abdulkadir-gungor / JPGtoMalwareIt embeds the executable file or payload inside the jpg file. The method the program uses isn't exactly called one of the steganography methods. For this reason, it does not cause any distortion in the JPG file. The JPG file size and payload do not have to be proportional.The JPG file is displayed normally in any viewing application or web application. It can bypass various security programs such as firewall, antivirus. If the file is examined in detail, it is easier to detect than steganography methods. However, since the payload in the JPG file is encrypted, it cannot be easily decrypted. It also uses the "garbage code insertion/dead-code insertion" method to prevent the payload from being caught by the antivirus at runtime.
Jpinsoft / DeepSoundOfficial DeepSound repository migrated from jpinsoft.net. DeepSound is a freeware steganography tool and audio converter that hides secret data into audio files. The application also enables you to extract secret files directly from audio files or audio CD tracks.
tnt-wolve / Ch3r0Hackingtool Menu 🧰 AnonSurf Information Gathering Password Attack Wireless Attack SQL Injection Tools Phishing Attack Web Attack Tool Post exploitation Forensic Tools Payload Creator Router Exploit Wifi Jamming XSS Attack Tool Reverse Engineering SocialMedia Finder DDos Attack Tools Steganography Tools IDN Homograph Attack Hash Cracking Tools SocialMedia Attack Android Hack RAT Tools Web Crawling Payload Injector Update System AnonSurf Anonmously Surf Multitor Information Gathering Nmap Dracnmap Port Scanning Host To IP Xerosploit Infoga - Email OSINT ReconSpider RED HAWK (All In One Scanning) ReconDog Striker SecretFinder Port Scanner Breacher Password Attack Cupp WordlistCreator Goblin WordGenerator Credential reuse attacks Wordlist (Contain 1.4 Billion Pass) Wireless Attack WiFi-Pumpkin pixiewps Bluetooth Honeypot GUI Framework Fluxion Wifiphisher Wifite EvilTwin SQL Injection Tools sqlmap tool NoSqlMap Damn Small SQLi Scanner Explo Blisqy - Exploit Time-based blind-SQL injection Leviathan - Wide Range Mass Audit Toolkit SQLScan SocialMedia Attack Instagram Attack AllinOne SocialMedia Attack Facebook Attack Application Checker Android Attack Keydroid MySMS Lockphish (Grab target LOCK PIN) DroidCam (Capture Image) EvilApp (Hijack Session) Phishing Attack Setoolkit SocialFish HiddenEye Evilginx2 Shellphish BlackEye I-See-You(Get Location using phishing attack) SayCheese (Grab target's Webcam Shots) QR Code Jacking Web Attack SlowLoris Skipfish SubDomain Finder CheckURL Blazy Sub-Domain TakeOver Post Explotation Vegile - Ghost In The Shell Chrome Keylogger Forensic Tool Bulk_extractor Disk Clone and ISO Image Aquire AutoSpy Toolsley Wireshark Payload Generator The FatRat* Brutal Stitch MSFvenom Payload Creator Venom Shellcode Generator Spycam Mob-Droid Exploit Framework RouterSploit WebSploit Commix Web2Attack Fastssh SocialMedia Finder Find SocialMedia By Facial Recognation System Find SocialMedia By UserName Sherlock SocialScan Steganography SteganoHide StegnoCracker Whitespace Ddos Attack tool SlowLoris SYN Flood DDoS Weapon UFOnet GoldenEye XSS Attack tool DalFox(Finder of XSS) XSS Payload Generator Advanced XSS Detection Suite Extended XSS Searcher and Finder XSS-Freak XSpear XSSCon XanXSS IDN Homograph EvilURL Email Verifier KnockMail Hash Cracking Tool Hash Buster
dpapathanasiou / Tweet SecretThis is a text steganography application optimized for use on Twitter, written in Clojure.
achorein / SilenteyeSilentEye is a cross-platform application design for an easy use of steganography
jaceddd / Text WatermarkAllows invisible watermarking of text and invisible encrypted messages. Uses 17 different invisible characters as HEX + delimiter. Includes encoder, decoder, spammer and other tools.
sionpardosi / Pengembangan Aplikasi Enkripsi Dan Steganografi Playfair ElGamal Dan LSBDevelopment of an Encryption and Steganography Application: Playfair, ElGamal, and LSB in Software Security - Aplikasi Enkripsi dan Steganografi: Playfair, ElGamal, dan LSB dalam Keamanan Perangkat Lunak
arsalanjabbari / Image Steganography LSBImage-Steganography-LSB is a command-line application that enables users to perform steganography using the Least Significant Bit (LSB) algorithm on images. This technique allows you to hide sensitive information within image files in a way that is not detectable by the human eye.
MathWorks-Teaching-Resources / Applied Linear AlgebraLearn linear algebra by applications in stoichiometry, steganography, static force analysis, and machine learning.
aashishvinu / Secret PixelSecret-pixel is a web application that leverages the principles of multidata steganography
ktekeli / Img StegoAn example application for blind image steganography with a GUI in C#
MateiIonutEduard / ColibriAn application that can be used into steganography to hide plain text or cipher text messages inside image files.
rubendal / SteganographyC# Windows Forms application to apply steganography to image and audio files
ImTheCurse / HiddenInPlainSight🔐ㅤSimple C++ Image Steganography CLI tool to encrypt and decrypt messages hidden using RGB channel manipulation.
ctfacademy / Ctfacademy.github.ioWelcome to Cyber Training Force Academy (CTFA). CTFA is an elite training platform for tomorrow’s cyber-defenders. Through the course of four modules, you will learn some of the basics of the cybersecurity world. In module 1, we dive into the realm of cryptography and learn about ciphers, file forensics, and steganography. For module 2, we will study the investigative tactics of open-source intelligence. Module 3 introduces the world of web application exploitation as we explore the many ways that web security can be breached.
vibhusehra / EnshroudAudio Steganography and Encryption based application where people can send text messages that are encrypted and hidden in audio.
HimanshuGupta-p1 / ESCUTCHEONA web application using Angular framework that conceals information using LSB Steganography in the image and retrieves it via Steganalysis(through JavaScript).
athrvadeshmukh / SteganographyxIt is a Steganography Project created for IBM Skills Build Internship with collaboration with Edunet and AICTE. You can hide text in images as well as wave audio using key and similarly you and decrypt the images and audio file to see the hidden text in it.
wasimreja / SteganoSteganography web application to embed and extract hidden data within images.