Linking pages
- Executable PNGs - djhworld https://djharper.dev/post/2020/12/26/executable-pngs/ 223 comments
- GitHub - carlospuenteg/File-Injector: File Injector is a script that allows you to store any file in an image using steganography https://github.com/carlospuenteg/File-Injector 172 comments
- Spore creature creator and steganography | Ned Batchelder http://nedbatchelder.com/blog/200806/spore_creature_creator_and_steganography.html 64 comments
- GitHub - dpapathanasiou/tweet-secret: This is a text steganography application optimized for use on Twitter, written in Clojure. https://github.com/dpapathanasiou/tweet-secret 60 comments
- Cofactor Explained: Clearing Elliptic Curves' dirty little secret http://loup-vaillant.fr/tutorials/cofactor 57 comments
- Massive AdGholas Malvertising Campaigns Use Steganography and File Whitelisting to Hide in Plain Sight | Proofpoint US https://www.proofpoint.com/us/threat-insight/post/massive-adgholas-malvertising-campaigns-use-steganography-and-file-whitelisting-to-hide-in-plain-sight 51 comments
- GitHub - DimitarPetrov/stegify: 🔍 Go tool for LSB steganography, capable of hiding any file within an image. https://github.com/DimitarPetrov/stegify 47 comments
- Hiding a photo inside another photo https://www.avestura.dev/blog/hide-a-photo-inside-another-photo 47 comments
- The PICO-8 Virtual Fantasy Console is an idealized constrained modern day game maker - Scott Hanselman's Blog https://www.hanselman.com/blog/ThePICO8VirtualFantasyConsoleIsAnIdealizedConstrainedModernDayGameMaker.aspx 37 comments
- Playable Quotes for Game Boy https://tenmile.quote.games/ 31 comments
- One of the world’s most advanced hacking groups debuts new Titanium backdoor | Ars Technica https://arstechnica.com/information-technology/2019/11/newly-discovered-titanium-backdoor-employs-clever-ways-to-go-undetected/ 24 comments
- No, There Isn’t Child Porn on the Bitcoin Blockchain – News Bitcoin News https://news.bitcoin.com/no-isnt-child-porn-bitcoin-blockchain/ 21 comments
- Themes from Real World Crypto 2022 | Trail of Bits Blog https://blog.trailofbits.com/2022/05/03/themes-from-real-world-crypto-2022/ 18 comments
- Spy stuff: symmetric crypto with forward secrecy https://paranoidbeavers.ca/spy-stuff.html 18 comments
- GitHub - dennis-tra/image-stego: 🏞 Steganography-based image integrity - Merkle tree nodes embedded into image chunks so that each chunk's integrity can be verified on its own. https://github.com/dennis-tra/image-stego 10 comments
- Millions exposed to malvertising that hid attack code in banner pixels | Ars Technica http://arstechnica.com/security/2016/12/millions-exposed-to-malvertising-that-hid-attack-code-in-banner-pixels/ 9 comments
- Neural networks can hide malware, researchers find – TechTalks https://bdtechtalks.com/2021/12/09/evilmodel-neural-networks-malware/ 8 comments
- Home routers under attack in ongoing malvertisement blitz | Ars Technica http://arstechnica.com/security/2016/12/home-routers-under-attack-in-ongoing-malvertisement-blitz/ 8 comments
- Surrounded by Elligators: Implementing Crypto With Nothing to Compare to. http://loup-vaillant.fr/articles/implementing-elligator 7 comments
- Signs from above: Drone with projector successfully trolls car AI | Ars Technica https://arstechnica.com/cars/2019/06/spoofing-car-ai-with-projected-street-signs/ 7 comments
Related searches:
Search whole site: site:wikipedia.org
Search title: Steganography - Wikipedia
See how to search.