(Page 4 of 4)   < Prev  1 2 3 4 

Category: Cryptography » Steganography

PGPn123
Added 2001-10-22
by Alpha1 Enterprises, alpha1@pobox.com
PGPn123 is primarily a pgp "windows clipboard" shell program that makes using pgp for Eudora, Agent, or Pegasus Mail very easy. The latest version includes a steganography option that is implemented after the message is pgp encrypted. The algorithm is based on the Texto program, making encrypted text files look like something between mad libs and bad poetry. Shareware turned freeware, there is a FREE registration key generator available from the authors.

gifshuffle
Added 2001-10-22
by Matthew Kwan, mkwan@cs.mu.oz.au
The program gifshuffle is used to conceal messages in GIF images by shuffling the colourmap, which leaves the image visibly unchanged. gifshuffle works with all GIF images, including those with transparency and animation, and in addition provides compression and encryption of the concealed message. Follow the link to the homepage for source tar.gz for possible port to other platforms (eg Linux).

MP3Stego GUI
Added 2001-10-22
by Frans Vyncke, Sky61511@skynet.be
This is a graphical interface for the MP3-steganography program MP3Stego by Fabien Petitcolas.

Covert_TCP
Added 2001-10-22
by Craig H. Rowland, crowland@psionic.com
This program manipulates the TCP/IP header to transfer a file one byte at a time to a destination host. This progam can act as a server and a client and can be used to conceal transmission of data inside the IP header. This is useful for bypassing firewalls from the inside, and for exporting data with innocuous looking packets that contain no data for sniffers to analyze.

Scytale
Added 2001-10-22
by Patrick Buseine, buseine@bigfoot.com
Scytale 1.5 is designed for people that use or want to use PGP 2.6.x. A brief guide is included to help you to select the right version of PGP, find it on the Internet and install it correctly. This guide also includes a tutorial that explains what public key cryptography is and how to use some useful and basic commands of PGP. Once familiarized with PGP, Scytale helps you to take advantage of its power. Among other things, Scytale can help you to choose a good password with six dictionaries of common passwords and a truly random password generator. The built-in wiper deletes files securely from your hard drive. Steganography, a technique to hide data within media such as pictures is included. This is the 32-bit version. A 16-bit version is available from the author's homepage.

StegFS Kernel Patch
Added 2001-10-22
by Andrew McDonald, andrew@mcdonald.org.uk
StegFS is a Steganographic File System for Linux. Not only does it encrypt data, it also hides it such that it cannot be proved to be there. Note that this is still 'under development'. It is not bug-free yet. There may be possibly serious problems. In short, if it destroys your computer or your data or causes a minor nuclear holocaust don't blame the programmers. Feel free to try it, but don't get too upset if you have problems. There are still bugs/misfeatures that want fixing. However, it should be stable enough for use. You will need to know how to patch and compile a kernel. It is strongly recommended that you read "StegFS: A Steganographic File System for Linux" before attempting to use this file system. StegFS is distributed as a kernel patch and a tarball containing a set of utilities. You need both to be able to use StegFS. This package is the kernel patch

StegFS tools
Added 2001-10-22
by Andrew McDonald, andrew@mcdonald.org.uk
StegFS is a Steganographic File System for Linux. Not only does it encrypt data, it also hides it such that it cannot be proved to be there. Note that this is still 'under development'. It is not bug-free yet. There may be possibly serious problems. In short, if it destroys your computer or your data or causes a minor nuclear holocaust don't blame the programmers. Feel free to try it, but don't get too upset if you have problems. There are still bugs/misfeatures that want fixing. However, it should be stable enough for use. You will need to know how to patch and compile a kernel. It is strongly recommended that you read "StegFS: A Steganographic File System for Linux" before attempting to use this file system. StegFS is distributed as a kernel patch and a tarball containing a set of utilities. You need both to be able to use StegFS. This package contains the utilities.

Refugee
Added 2001-10-22
by Gregory Hull, ghull@synack.com
Refugee is a file encryption and steganography utility. It implements Blowfish and Rijndael and is portable between big and little endian platforms. It supports key sizes from 32-448 bits and gives the user many ways to make keys. It currently supports hiding user data in PNG files.

CyberArmy Spam Stenographer
Added 2001-10-22
by Xenographic
Mimic.pl is CyberArmy.com's open-source answer to spammimic.com's very interesting little utility that encodes messages into spam. Since we liked it so much, we wrote our own and put it under the BSD license so that everyone can enjoy it on their own terms. It has a few extra features, in that it can easily encode much longer messages and newlines, even if it cannot handle foreign accents. Made with all-natural NANAS spam.

Search Tools
Keyword:
Platform:
Category:
Browse by category
Auditing
Log Analysis, Host, Passwords, Network, File Integrity, PSTN, Forensics, Backdoors, Source Code
Sniffers
Recovery
Passwords
Utilities
Passwords, Filesystem, Network, System, Compiler, Log Management, Usage Monitoring, Email
Authentication
One Time Passwords, User Authentication, Password Management, Web, Server, Certificates, Tokens
Intrusion Detection
Network, Host, Web, Evasion
Access Control
Network, Firewall, user privileges, RPC, Bootup, File System, Applications, Mandatory Access Control, Server, X-Windows, ACLs, Privileges
Replacement
Libraries, Applications
Programming
Libraries
Cryptography
Libraries, Random Numbers, Traffic Encryption, Data Encryption, Cryptoanalysis, Steganography, E-mail
Network Monitoring
Policy Enforcement
Web Access, Email
System Security Management
Accounts, Console, Windows NT, Firewall, Configuration, Filesystem, Linux, Solaris, Monitoring
Network Utilities
Tunneling, Miscellaneous, Monitoring
Rootkits
Secure Deletion
Hardening
Linux, FreeBSD, NT, Solaris
Hostile Code
Detection, Removal, Sandbox


 

Privacy Statement
Copyright 2010, SecurityFocus