[go: up one dir, main page]

Showing 45 open source projects for "c# steganography"

View related business solutions
  • Gen AI apps are built with MongoDB Atlas Icon
    Gen AI apps are built with MongoDB Atlas

    The database for AI-powered applications.

    MongoDB Atlas is the developer-friendly database used to build, scale, and run gen AI and LLM-powered apps—without needing a separate vector database. Atlas offers built-in vector search, global availability across 115+ regions, and flexible document modeling. Start building AI apps faster, all in one place.
    Start Free
  • Attack Surface Management | Criminal IP ASM Icon
    Attack Surface Management | Criminal IP ASM

    For security operations, threat-intelligence and risk teams wanting a tool to get access to auto-monitored assets exposed to attack surfaces

    Criminal IP’s Attack Surface Management (ASM) is a threat-intelligence–driven platform that continuously discovers, inventories, and monitors every internet-connected asset associated with an organization, including shadow and forgotten resources, so teams see their true external footprint from an attacker’s perspective. The solution combines automated asset discovery with OSINT techniques, AI enrichment and advanced threat intelligence to surface exposed hosts, domains, cloud services, IoT endpoints and other Internet-facing vectors, capture evidence (screenshots and metadata), and correlate findings to known exploitability and attacker tradecraft. ASM prioritizes exposures by business context and risk, highlights vulnerable components and misconfigurations, and provides real-time alerts and dashboards to speed investigation and remediation.
    Learn More
  • 1
    SunVirgo-teaching-assistant

    SunVirgo-teaching-assistant

    Mentor, code c, c++, java, go, php, swift, .. DevSecOps virtual lab, .

    Menor, code c, c++, java, python, go, php, swift, .., DevSecOps virtual lab, .. This software is provided as a demonstration build. Redistribution of the binary is allowed for academic evaluation only. More previously completed projects will be released incrementally as executable packages are rebuilt for public distribution. www.youtube.com/embed/fzoISpZv5d0?rel=0
    Downloads: 12 This Week
    Last Update:
    See Project
  • 2
    tls SNI injector + VPNGate Free Server

    tls SNI injector + VPNGate Free Server

    VPN 4G ssl/tls sni VPNGate CN/RU/JP/UK..

    TCP Over SSL Tunnel TCP Over SSL Tunnel is a free SSL tool with SNI Host (Spoof Host) support ( SSL Injector ). VPN client 4G ssl/tls sni + SoftEther + VPNGate CN/RU/JP/UK.. Sibling project https://tunnelsmux.great-site.net/?i=1 🚀 Free VPNGate + SNI Customization 🛡️ One of the most powerful censorship bypass tools ever shared 🌍 Works globally — optimized for Vietnam, Iran, and more 💡 Try it today and experience real freedom! This VPNGate server setup is shared for...
    Leader badge">
    Downloads: 46 This Week
    Last Update:
    See Project
  • 3
    KeyGuard

    KeyGuard

    A simple, secure and offline Password Manager App

    This is a simple, secure and offline Password Manager App made in C# & .NET Maui. Your passwords are safely stored with AES encryption. You can add, edit, delete and export your passwords. The project makes use of the MVVM (Models, Views, View Models) architecture.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    Stegano.Net

    Stegano.Net

    Image Steganography for Windows

    Stegano.Net is free Steganography Tool for Windows. It hides texts/files/data in images. The secret data can be unveiled from the Images afterwards.
    Downloads: 0 This Week
    Last Update:
    See Project
  • DDoS Protection Solution | A10 Networks Icon
    DDoS Protection Solution | A10 Networks

    For enterprise IT security teams and network administrators looking to safeguard their networks against the latest and more severe DDoS threats

    The standalone SaaS-based DDoS intelligence solution proactively combats the increasing volume and complexity of DDoS threats, reducing operational costs and improving DDoS detection while safeguarding system availability— no dedicated DDoS equipment needed.
    Learn More
  • 5
    Covert Channels Evaluation Framework

    Covert Channels Evaluation Framework

    Network steganography / covert channels evaluation tool

    Encryption is not sufficient to secure communication because often the simple fact that communication exists is often enough to raise suspicion and take further actions. Covert channels aim to hide the very existence of communication by using means of communication not normally intended to be used. The Covert Channels Evaluation Framework (CCHEF) is a flexible software framework for empirically evaluating network steganography methods or covert channels in network protocols. CCHEF can be...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    Zipped Steganography

    Zipped Steganography

    Hide files into ZIP archives

    Hide files into ZIP archives. Support Password protect mode for ZIP archives. Auto attaching ZIP file into Outlook
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Kryfto

    Kryfto

    Outlook 2013 Add-in - Image and Excel Steganography

    Using Kryfto Outlook 2013 Add-in you could send a email using image or excel steganography.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Image Steganography(JPEG)

    Image Steganography(JPEG)

    Steganography for JPEG

    It's a C# .Net based Image Steganography project to support JPEG steganography.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9

    CrypSten

    A Hybrid Cryptosystem with Steganography DLL

    A library written in Visual C# for encrypting a text message into an image file, and decrypting an image file to get the text message using Rijndael Algorithm, RSA Algorithm, and LSB Substitution Algorithm.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Network Performance Monitoring | Statseeker Icon
    Network Performance Monitoring | Statseeker

    Statseeker is a powerful network performance monitoring solution for businesses

    Using just a single server or virtual machine, Statseeker can be up and running within minutes, and discovering your entire network in less than an hour, without any significant effect on your bandwidth availability.
    Learn More
  • 10
    Steganography v2.0

    Steganography v2.0

    Hide archives inside any image type

    Hides any archive file inside any image, when opened it functions exactly as an image and can still be printed as usual, but once opened with WinRAR or any other similar program the contents of the archive can be seen. ************************************************************************************************************************** Now has the ability to mask the size of the image so that it stays the same even when TB's of data are hidden within...
    Leader badge">
    Downloads: 41 This Week
    Last Update:
    See Project
  • 11
    SilentEye
    SilentEye is a cross-platform application design for an easy use of steganography. It provides a pretty nice interface and an easy integration of new steganography algorithm and cryptography process.
    Leader badge">
    Downloads: 190 This Week
    Last Update:
    See Project
  • 12

    SteghideGUI

    Steghide GUI is perfect C++/Qt app for embedding and extracting data

    Steghide is a steganography program that is able to hide data in various kinds of image- and audio-files. The color- respectivly sample-frequencies are not changed thus making the embedding resistant against first-order statistical tests. SteghideGUI is Qt GUI with various features. It supports steganography capacity counter (also supports UTF8 and compression). It serves like a educational demonstration of embedding process. You can also view cover and stegogram in custom image viewer.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    docx steganography

    docx steganography

    embed and extract secret message in docx

    this tool is steganography tool ,which make us of docx's not exist attribute to hide message. for example "<w:p aaa="123" bb="244".........>",the attribute (aaa,bb)above is not exist in office 2007 library.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 14
    office steg

    office steg

    office steganography ooxml atributes

    this tool is steganography tool ,which make us of docx's not-exist attribute to hide message. for example "<w:p aaa="123" bb="244".........>",the attribute (aaa,bb)above is not exist in office 2007 library.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 15

    yeo

    command-line steganography application

    designed to hide messages in jpg and png images without the requirement for any plain-text files. uses aes256 on data, using an sha256 hash of the password as the encryption key. rotates the password by 1 character, and uses an sha256 hash of that for the random seed for the image pointer access. security and invisibility of data is currently being peer-reviewed (since ~2014). At this point it looks like no vulnerabilities have been identified yet. this will evolve further, but remain...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    This project is a Steganography software that allows you conceal files inside any picture type.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17

    aleXa Steganography Tool

    Tool to encode a message inside an image using LSB

    xst is a desktop tool written in C# that allows to encode a message inside an image file. The information is Encrypted, protected by a password.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    2Pix
    2Pix integrates with Windows to allow you to easily encrypt and hide files in bitmap images, a process called steganography (not to be confused with stenography). Data is stored in the low-order bits of each pixel of an image, so the file is completely hidden from view. Version 1.1 now provides plausible deniability because no unencrypted signature is stored in the image header. It should be impossible to prove an image contains a hidden file (if you use a strong password and only use 1 or 2...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    Steganography Tool
    LSB Steganography tool which provides hide ASCII infomation within 24-bit Bitmap images
    Downloads: 6 This Week
    Last Update:
    See Project
  • 20
    milkInk – power steganography program.Program allow to compress some file, to insert it in image,crypt this file with 32bytes AES and save this image with the hidden,inserting file.On the other hand you can extract hidden file from image and save it.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    Steganography framework with support for several carrier file formats: Pixel graphics, RIFF WAVE format, any sound to save lossy/analog, standard MIDI File Format, IL or .NET assemblies, XML documents, unsorted text lists.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    Simple Stego is a steganography tool written in C++ that hides data in the least significant bits of a PNG image.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    PQStego is a C implementation of J. Fridrich algorithm for embedding secret messages in JPEG images as described in her paper "Perturbed quantization steganography with wet paper codes "
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    it is about a GUI (Graphical User Interface ) program based on Qt4 library ,that hides data on a picture using differents method depending on picture format (BMP,JPG,PNG,...) (this is called Steganography) the data can be on any file format
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    StegSharp is an application built on C# 2.0 that explains the basic principles of steganography. With StegSharp the user can hide and recover text or files from image files. Supported image extensions are: jpeg and bmp.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • Next