A steganographic coder for WAV files. This C program accepts two command line arguments: the path to a .wav audio file and the path to any other kind of file. The .wav audio file will be overwritten to include the contents of the second file in the LSB portions of each sample in the .wav. Notes: A 300-second .wav file, at 44100 samples per second with 16 bits per sample for each channel (left and right), has 300 * 44100 * 2 * 16 = bits. If a separate file is encoded into each LSB of each channel sample, the max size of the second file is 300 * 44100 * 2 * 1 = bits.
FEATURES
ALTERNATIVES
Steganography brute-force utility with performance issues, deprecated in favor of stegseek.
Encode or encrypt strings to various hashes and formats, including MD5, SHA1, SHA256, URL encoding, Base64, and Base85.
Calculates RSA parameters and generates RSA private keys in DER or PEM format.
Zama's fhEVM Coprocessor is an open-source tool for developing applications using Fully Homomorphic Encryption, enabling privacy-preserving computations in various domains.
Cyera is a data security platform that discovers, classifies, and secures sensitive data across various environments, offering features such as DSPM, identity data access, and data privacy compliance.
Tang is a server for binding data to network presence, providing an easy and secure alternative to key escrow.
PINNED
Fabric Platform by BlackStork
Fabric Platform is a cybersecurity reporting solution that automates and standardizes report generation, offering a private-cloud platform, open-source tools, and community-supported templates.
Mandos Brief Newsletter
Stay ahead in cybersecurity. Get the week's top cybersecurity news and insights in 8 minutes or less.
Wiz
Wiz Cloud Security Platform is a cloud-native security platform that enables security, dev, and devops to work together in a self-service model, detecting and preventing cloud security threats in real-time.
Adversa AI
Adversa AI is a cybersecurity company that provides solutions for securing and hardening machine learning, artificial intelligence, and large language models against adversarial attacks, privacy issues, and safety incidents across various industries.