-
We still need to figure out and describe how to use Elligator with Decaf/Ristretto. [The Ristretto website](https://ristretto.group/) and I-D.draft-irtf-cfrg-ristretto255-decaf448-00 specify a “one-wa…
-
I want to hide some data of user in the UIImage.. After he sends Image to someone I should be able to decode info from it and see the users details which are encoded in the Image.. Is this possible ?
-
I created a steganography function that can be usefull for some, and fun for others. Hope you find it interesting. It has 100% test coverage and CircleCi integration in my repo.
```json
{
"ti…
auyer updated
4 years ago
-
Or at least that's what they say.
Let see where I can go with converting an image to a novel.
-
I've tried running `steg86 profile` against several EXEs and DLLs, both PE32 and PE32+, and every time, it has produced an error like this:
```
Fatal: encountered an invalid instruction at text of…
-
Implement a basic form of steganography using the content manipulation done by the proxy. One suggestion is to hide the entire HTTP data in a div and then put it in a benign request or response.
-
I've been inspired by this discussion on Twitter:
- https://twitter.com/ma_salmon/status/842751403001073665
These are the kinds of tweets I'm referring to in this discussion:
- https://twitter…
-
Found this project through the [link EGreg posted on Hacker News](https://www.youtube.com/watch?v=pZ1O_gmPneI&app=desktop). QBix seems like a [federated social network](http://fediverse.gitlab.io/) pr…
-
# Cryptography
> Resources:
- https://en.wikipedia.org/wiki/Outline_of_cryptography
- https://en.wikipedia.org/wiki/Cryptography
- https://en.wikipedia.org/wiki/History_of_cryptography
- http…
-
# Description
The attacker now uploads a new payload (T1105) to the victim. The payload is a legitimately formed image file with a concealed PowerShell script (T1027).