https://github.com/0xc7r/semi-stegnography
Uses the basis of how Stegnography works but without using images. Prints out the message and data of the targeted string.
https://github.com/0xc7r/semi-stegnography
obfuscate obfuscate-strings obfuscation protection python python-3 python3 stegnography
Last synced: about 1 month ago
JSON representation
Uses the basis of how Stegnography works but without using images. Prints out the message and data of the targeted string.
- Host: GitHub
- URL: https://github.com/0xc7r/semi-stegnography
- Owner: 0XC7R
- License: mit
- Created: 2024-12-05T22:54:51.000Z (5 months ago)
- Default Branch: main
- Last Pushed: 2025-03-14T09:06:00.000Z (about 1 month ago)
- Last Synced: 2025-03-27T12:14:37.331Z (about 1 month ago)
- Topics: obfuscate, obfuscate-strings, obfuscation, protection, python, python-3, python3, stegnography
- Language: Python
- Homepage:
- Size: 5.86 KB
- Stars: 1
- Watchers: 1
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
# Semi-Stegnography
Uses the basis of how Stegnography works but without using images. Prints out the message and data of the targeted string.-----
# Issue with my code? PR it.
I have had some come to me accusing me of not understanding strings because of the append on L32.I could have done `str(pixel[blue]).join(binary_string)` or even converting the variable into a list and `.append`ing everything then converting into a string at the return.
However I wrote this late at night and I do not care as it does do what it is needed too.I have never seen people get triggered over an operator before.
