Showing 34 open source projects for "steganography tool"

View related business solutions
  • Get full visibility and control over your tasks and projects with Wrike. Icon
    Get full visibility and control over your tasks and projects with Wrike.

    A cloud-based collaboration, work management, and project management software

    Wrike offers world-class features that empower cross-functional, distributed, or growing teams take their projects from the initial request stage all the way to tracking work progress and reporting results.
    Learn More
  • Strengthen your current Business intelligence infrastructure by automating reports and manual tasks Icon
    Strengthen your current Business intelligence infrastructure by automating reports and manual tasks

    Select, Format, Schedule and Deliver!

    PBRS™ and CRD®, our standalone report scheduling solutions for Power BI, Microsoft SQL Server Reporting Services® (SSRS) and SAP Crystal Reports®, are designed to supplement and strengthen your current Business intelligence infrastructure by automating reports & manual tasks, layering useful incremental capabilities, and scaling capacity by orders of magnitude. They supercharge operational productivity while lowering administrative costs.
    Free Trial
  • 1
    Tomb

    Tomb

    the Crypto Undertaker

    Tomb is a minimalistic command-line tool for creating and managing encrypted “tombs,” which are files that act as mountable, private storage vaults. Under the hood it uses Linux dm-crypt with LUKS for strong, disk-level encryption, and separates the key material from the vault itself to improve security workflows. Keys can be protected with passphrases and even hidden via steganography inside innocuous files, giving you options for concealment and off-device storage.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    Cyphernight-MAX SEC
    Dexmond.com is the official website of Dexmond Technologies, dedicated to CypherNight: MAX-SEC V3, a professional-grade, multi-platform data encryption suite designed for securing, digitally signing, and managing sensitive files with uncompromising security. The core tool combines military-strength cryptography — AES-256-GCM for symmetric encryption, RSA-4096 (with OAEP padding) for asymmetric operations, Ed25519 digital signatures, and Argon2id for secure passphrase-based key derivation — to protect data against brute-force, offline, and alteration attacks. Unique features include per-chunk authentication, single-use uniqueness markers, encrypted key vaults, forced external archive loading for safe inspection of ZIP/RAR/ISO files, universal forensic archive extraction, and steganography (LSB hiding of files inside images). ...
    Leader badge
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    tls SNI injector + VPNGate Free Server

    tls SNI injector + VPNGate Free Server

    VPN 4G ssl/tls sni VPNGate CN/RU/JP/UK..

    Sibling project https://sourceforge.net/projects/android-64-psimux-4g-0limit/ TCP Over SSL Tunnel TCP Over SSL Tunnel is a free SSL tool with SNI Host (Spoof Host) support ( SSL Injector ). VPN client 4G ssl/tls sni + SoftEther + VPNGate CN/RU/JP/UK.. 🚀 Free VPNGate + SNI Customization 🛡️ One of the most powerful censorship bypass tools ever shared 🌍 Works globally — optimized for Vietnam, Iran, and more 💡 Try it today and experience real freedom! This VPNGate server setup...
    Downloads: 97 This Week
    Last Update:
    See Project
  • 4
    PI-Based Image Encoder / Converter

    PI-Based Image Encoder / Converter

    Python code able to convert / compress image to PI (3.14, π) Indexes

    Image processing tool that encodes pixel data as indices within the first 16.7 million digits of PI (π). Features high-performance Numba-accelerated search and a signature 'film-grain' aesthetic upon reconstruction. ZIP also include 16 MB file with 16,7 mil numbers of PI Benchmark(Single-Thread): Hardware & Environment Apple Silicon: Apple M2 (Mac mini/MacBook) x86_64 Platform: Intel Core Ultra 5 225F (Arrow Lake, 10 Cores) OS 1: Fedora 43 (GNOME) OS 2: Windows 11 Pro...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Create stunning, professional email signatures in minutes Icon
    Create stunning, professional email signatures in minutes

    For companies looking to create, assign and manage all their employees email signatures and add targeted marketing banners.

    Create, assign and manage all your employees’ email signatures and add targeted marketing banners. Stop getting worked up about your signatures! Leverage a centralized interface to easily create and manage the email signatures of all your employees. Take advantage of each email to broadcast and amplify your brand. Letsignit helps you regain control over your digital identity. Harmonize 100% of your employee’s email signatures in just a few clicks! 121 professional emails are received and 40 are sent every day by an employee. With Letsignit, turn every email into a powerful communication opportunity: send the right message to the right person at the right time! Innovative more than tech, inspiring more than following. Authentic more than overrated, close more than "think big", trustworthy more than doubtful. Hands-on more than complex, available but yet premium, fun but yet expert.
    Learn More
  • 5
    Pixload

    Pixload

    Image Payload Creating/Injecting tools

    ...If the target image exists, it can inject into it; otherwise, it generates a new one. Offers separate utilities per format (e.g., bmp.pl, gif.pl, jpg.pl, png.pl) for injection or creation. Functions as a steganography tool for hiding backdoors or messages in images.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 6
    Hackingtool

    Hackingtool

    ALL IN ONE Hacking Tool For Hackers

    ...It bundles many utilities (port scanners, payload injectors, web attack tools, phishing tools, wireless attack tools, reverse engineering, etc.) into a menu interface. Includes many individual tools, often wrappers or aggregations of existing well-known tools (e.g. port scanners, web attack tools, steganography, hash cracking etc.). A menu interface offering categories: reconnaissance, payload creation, wireless attacks, reverse engineering, exploit frameworks, etc. Users can pick which tool to run. It is intended more for “ethical / lab / educational” hacking contexts rather than production or stealth scenarios. It depends a lot on external tools, grants, and root privileges in many cases.
    Downloads: 20 This Week
    Last Update:
    See Project
  • 7

    hk-wav-steganography

    tool for hide date into WAV Files

    tool for hide date into WAV Files . this is a tool for sound steganography .
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8

    hk-movie-steganography

    tool for hide data into movie files

    tool for hide data into movie files . support all format movies like avi mkv mp4 wmv . mp4 mkv avi wmv steganography tool .
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Stegano.Net

    Stegano.Net

    Image Steganography for Windows

    Stegano.Net is free Steganography Tool for Windows. It hides texts/files/data in images. The secret data can be unveiled from the Images afterwards.
    Downloads: 0 This Week
    Last Update:
    See Project
  • GoAnywhere Managed File Transfer (MFT) Icon
    GoAnywhere Managed File Transfer (MFT)

    Secure and simplify your file transfers

    GoAnywhere MFT provides secure managed file transfer for enterprises. Deployable on-premise, in the cloud, or in hybrid environments, GoAnywhere MFT software enables organizations to exchange data among employees, customers, and trading partners, as well as between systems, securely. GoAnywhere MFT was a recipient of the Cybersecurity Excellence Award for Secure File Transfer.
    Learn More
  • 10
    Invoke-PSImage

    Invoke-PSImage

    Encodes a PowerShell script in the pixels of a PNG file

    Invoke-PSImage is a PowerShell utility that hides, extracts, and optionally executes PowerShell payloads inside image files using simple steganography techniques. It can embed a script or binary blob into an image (commonly PNG or JPEG) and later recover that payload without leaving a separate file on disk, enabling in-memory execution workflows. The tool offers options for compression and encryption so the embedded content is both smaller and protected by a passphrase when required. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    Covert Channels Evaluation Framework

    Covert Channels Evaluation Framework

    Network steganography / covert channels evaluation tool

    Encryption is not sufficient to secure communication because often the simple fact that communication exists is often enough to raise suspicion and take further actions. Covert channels aim to hide the very existence of communication by using means of communication not normally intended to be used. The Covert Channels Evaluation Framework (CCHEF) is a flexible software framework for empirically evaluating network steganography methods or covert channels in network protocols. CCHEF can be...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    docx steganography

    docx steganography

    embed and extract secret message in docx

    this tool is steganography tool ,which make us of docx's not exist attribute to hide message. for example "<w:p aaa="123" bb="244".........>",the attribute (aaa,bb)above is not exist in office 2007 library.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 13

    Steganography for OfficeXML file

    A tool which you can use to hide a file in a Office 2007 file

    The tool is a MFC application,and the tool used the method of Unknown parts and Unknown relationships to embed a file (image or text file) in a Office 2007 file(.docx,.pptx and .xlsx).You can use the tool as follow: 1、Select a operation that you want to do. 2、Select a Office 2007 file . 3、Select a file that you want to hide.Please note,the name of the file must be composed with letter or number.If you select the operation "Information Extracting",then you need not to select the...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    office steg

    office steg

    office steganography ooxml atributes

    this tool is steganography tool ,which make us of docx's not-exist attribute to hide message. for example "<w:p aaa="123" bb="244".........>",the attribute (aaa,bb)above is not exist in office 2007 library.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15

    aleXa Steganography Tool

    Tool to encode a message inside an image using LSB

    xst is a desktop tool written in C# that allows to encode a message inside an image file. The information is Encrypted, protected by a password.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    Steganography Studio
    This project provides a steganography tool that allows to know, use and compare the results of current steganographic techniques. It also incorporates a comprehensive set of stegoanalitics methods for images.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 17
    Steganography Tool
    LSB Steganography tool which provides hide ASCII infomation within 24-bit Bitmap images
    Downloads: 26 This Week
    Last Update:
    See Project
  • 18
    VSL: Virtual Steganographic Laboratory

    VSL: Virtual Steganographic Laboratory

    Steganography and steganalysis software

    VSL is free image steganography and steganalysis software in form of graphical block diagramming tool. It allows complex using, testing and adjusting different steganographic techniques and provides simple GUI along with modular, plug-in architecture
    Downloads: 8 This Week
    Last Update:
    See Project
  • 19

    Anubis

    Secure Steganography Tool for all file types

    Steganography is the art of masking files behind an unsuspectable file, a sense of security through obscurity. Anubis is a lite steganography tool which enables users to successfully hide and encrypt any sensitive data.
    Leader badge
    Downloads: 11 This Week
    Last Update:
    See Project
  • 20
    JHide
    JHide is simple steganography tool aimed to demonstrate basic steganography techniques.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    A one stop solution for all your cryptology needs such as ENCRYPTION, DECRYPTION, STEGANOGRAPHY, PASSWORD GENERATOR, PASSWORD KEEPER, HASH CALCULATOR etc.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    Simple Stego is a steganography tool written in C++ that hides data in the least significant bits of a PNG image.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    A steganography tool. You can hide 2Gb file in multiple images, supported almost all graphic formats. Average capacity ~ 40%. Useful for publishing censored materials in the Internet. Details on the project's website (stegoshare.sf.net).
    Downloads: 6 This Week
    Last Update:
    See Project
  • 24
    A Steganographic Tool that lets u hide any file into any file. It is based on Image, Audio, Video Steganography that hides any file or message into an image(BMP,JPG,GIF), Audio/Video(MPG, WAV, etc) or any other file format(PDF,EXE,CHM etc..)
    Leader badge
    Downloads: 14 This Week
    Last Update:
    See Project
  • 25
    This software is a set of tools that hides C source code in txt files. Also the software is able to restore the txt files to C source code again. This work is based on the tool c2txt2c by Leevi Martilla. Csteg needs a book file in txt format to hide C so
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • Next
MongoDB Logo MongoDB