[go: up one dir, main page]

Showing 7 open source projects for "c# steganography"

View related business solutions
  • Gen AI apps are built with MongoDB Atlas Icon
    Gen AI apps are built with MongoDB Atlas

    The database for AI-powered applications.

    MongoDB Atlas is the developer-friendly database used to build, scale, and run gen AI and LLM-powered apps—without needing a separate vector database. Atlas offers built-in vector search, global availability across 115+ regions, and flexible document modeling. Start building AI apps faster, all in one place.
    Start Free
  • Intelligent predictive dialer for outbound call center Icon
    Intelligent predictive dialer for outbound call center

    Solution for lead generation, Political Campaigning, Telemarketing and Phone Polling

    Our autodialer software can massively increase productivity by dropping busy, unanswered and disconnected line, passing calls answered by real people back to your agents, and leaving messages on answering machines.
    Learn More
  • 1
    Covert Channels Evaluation Framework

    Covert Channels Evaluation Framework

    Network steganography / covert channels evaluation tool

    Encryption is not sufficient to secure communication because often the simple fact that communication exists is often enough to raise suspicion and take further actions. Covert channels aim to hide the very existence of communication by using means of communication not normally intended to be used. The Covert Channels Evaluation Framework (CCHEF) is a flexible software framework for empirically evaluating network steganography methods or covert channels in network protocols. CCHEF can be...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    Zipped Steganography

    Zipped Steganography

    Hide files into ZIP archives

    Hide files into ZIP archives. Support Password protect mode for ZIP archives. Auto attaching ZIP file into Outlook
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3

    yeo

    command-line steganography application

    designed to hide messages in jpg and png images without the requirement for any plain-text files. uses aes256 on data, using an sha256 hash of the password as the encryption key. rotates the password by 1 character, and uses an sha256 hash of that for the random seed for the image pointer access. security and invisibility of data is currently being peer-reviewed (since ~2014). At this point it looks like no vulnerabilities have been identified yet. this will evolve further, but remain...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4

    aleXa Steganography Tool

    Tool to encode a message inside an image using LSB

    xst is a desktop tool written in C# that allows to encode a message inside an image file. The information is Encrypted, protected by a password.
    Downloads: 0 This Week
    Last Update:
    See Project
  • No-Nonsense Code-to-Cloud Security for Devs | Aikido Icon
    No-Nonsense Code-to-Cloud Security for Devs | Aikido

    Connect your GitHub, GitLab, Bitbucket or Azure DevOps account to start scanning your repos for free.

    Aikido provides a unified security platform for developers, combining 12 powerful scans like SAST, DAST, and CSPM. AI-driven AutoFix and AutoTriage streamline vulnerability management, while runtime protection blocks attacks.
    Learn More
  • 5
    Steganography program. Crypture encrypts (1024 bit key) and stores files in Windows bitmap files. Only 6 KB, with no install required. Fills all bits with noise, to slip by standard steganalysis methods. Data header is encrypted and scattered as well.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 6
    Steganography tool which establishes a full-duplex steganographic data transfer protocol utilizing Real-time Transfer Protocol (RTP) packet payloads as the cover medium. The tool provides interactive chat, file transfer, and remote shell access.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Ano (Anonymous Network Overlay) is a decentralized IP router based on relaying principle. In Ano all IP traffic is anonymized, including TCP, UDP, ICMP and DNS protocols. Each node acts as a relay and NAT for external traffic.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next