Главная
Study mode:
on
You
History
Saved
In progress
0 courses
compleat
0 courses
#Art & Design
#Adobe
#ChatGPT
#GitHub
#Steganography
YouTube
education
Showing:
38
courses
Sort by Relevancy
Highest rated
Lowest rated
Most recently added
Kali Linux
0
rewiews
Comprehensive tutorial covering Kali Linux essentials, advanced techniques, and tools for cybersecurity enthusiasts and ethical hackers.
Add to list
41
Lesons
8 hours
On-Demand
Free-Video
Kali Linux Tutorials
0
rewiews
Learn Kali Linux pentesting techniques, including steganography, OWASP vulnerabilities, tool configuration, and CTF challenges. Hands-on tutorials cover essential hacking skills and real-world scenarios.
Add to list
17
Lesons
3 hours 30 minutes
On-Demand
Free-Video
Kali Linux Tutorial in Hindi
0
rewiews
Comprehensive Hindi tutorial on Kali Linux, covering installation, tools, and ethical hacking techniques for beginners and intermediate users.
Add to list
105
Lesons
17 hours
On-Demand
Free-Video
White Hat Cal Poly
Security Fundamentals - White Hat Officers
0
rewiews
Learn ethical hacking essentials: security concepts, historical ciphers, social engineering, steganography, and crypto vulnerabilities from White Hat experts.
Add to list
6
Lesons
48 minutes
On-Demand
Free-Video
Bill Buchanan OBE
Data Hiding and Obfuscation in Security and Network Forensics - Lecture 10
0
rewiews
Learn data hiding techniques including encryption, hashing, encoding, and steganography. Explore file allocation tables, naming conventions, and signatures for forensic analysis.
Add to list
13
Lesons
42 minutes
On-Demand
Free-Video
Bill Buchanan OBE
Forensic Computing - Part 1
0
rewiews
Comprehensive introduction to forensic computing, covering basic procedures, data collection, preservation, hiding techniques, and network traffic analysis.
Add to list
16
Lesons
1 hour 17 minutes
On-Demand
Free-Video
Bill Buchanan OBE
Forensic Computing - Procedures, Data Preservation, and Covert Channels - Part 1
0
rewiews
Explore digital forensics fundamentals, including evidence collection, data preservation, and covert channel detection techniques for network traffic analysis and hidden information discovery.
Add to list
20
Lesons
1 hour 17 minutes
On-Demand
Free-Video
PyCon US
PyCon US Lightning Talks - May 18
0
rewiews
Diverse Python-focused talks covering AI dining, data science journeys, perfect pitch, steganography, counting techniques, subinterpreters, physics discovery, and self-explanation.
Add to list
8
Lesons
41 minutes
On-Demand
Free-Video
Conf42
Steganography and Hackers - Techniques and Implications
0
rewiews
Explore steganography techniques used by hackers to hide data in IoT devices, with a live demonstration of concealing information in images.
Add to list
4
Lesons
12 minutes
On-Demand
Free-Video
Samuel Chan
Steganography Explanation and Code Examples - Least Significant Bit Replacement
0
rewiews
Explore steganography and the Least Significant Bit algorithm for hiding messages in digital images, with Python code examples for embedding and extracting secret data.
Add to list
1
Lesons
24 minutes
On-Demand
Free-Video
SyScan360
Stegosploit - Hacking with Pictures
0
rewiews
Explore innovative hacking techniques using steganography to hide exploits within images, blending cybersecurity with digital art for covert attacks and data exfiltration.
Add to list
1
Lesons
45 minutes
On-Demand
Free-Video
TheIACR
Useful Primitives and Cryptography in the Ads Ecosystem
0
rewiews
Explore cryptographic primitives in advertising, covering universal psychography, private computation, and challenges in adoption and scaling of privacy-preserving technologies.
Add to list
29
Lesons
1 hour 39 minutes
On-Demand
Free-Video
ChariotSolutions
Secrets and Lies: Protecting Mobile Apps Through Cryptography and Obfuscation
0
rewiews
Explore mobile app security, including cryptography, obfuscation, and steganography. Learn practical techniques to protect sensitive data, prevent attacks, and enhance overall app integrity.
Add to list
35
Lesons
59 minutes
On-Demand
Free-Video
Bill Buchanan OBE
Steganography: Techniques for Hiding Information in Digital Media
0
rewiews
Explore hidden message techniques, file carving, and covert channels in this comprehensive overview of steganography methods and applications.
Add to list
17
Lesons
1 hour 6 minutes
On-Demand
Free-Video
SecurityFWD
Hidden Messages in Plain Sight with Zero Width Characters - Steganography Techniques
0
rewiews
Explore hidden message techniques using zero-width characters in steganography. Learn applications, examples, and tools for encoding secret information in plain text.
Add to list
16
Lesons
48 minutes
On-Demand
Free-Video
CAE in Cybersecurity Community
The Use of Steganography and Steganalysis Trends in Computer Forensics
0
rewiews
Explore steganography and steganalysis techniques in digital forensics, examining current trends and applications for hidden data detection and extraction in cybersecurity investigations.
Add to list
1
Lesons
40 minutes
On-Demand
Free-Video
BSidesLV
When Steganography Stops Being Cool
0
rewiews
Explore the limitations and potential drawbacks of steganography techniques in digital security, examining real-world applications and challenges in hiding information.
Add to list
1
Lesons
36 minutes
On-Demand
Free-Video
Ekoparty Security Conference
Your Polyglot Belongs to Me - Steganography in Modern APTs
0
rewiews
Explore steganography in modern APTs and polyglots for hidden information in cyberattacks. Learn about attack and defense strategies using the speaker's tool, powerglot, with real-world examples.
Add to list
1
Lesons
48 minutes
On-Demand
Free-Video
Strange Loop Conference
Musical Steganography - Hiding Things in Music
0
rewiews
Explore techniques for concealing messages in music, from Bach's compositions to modern digital methods. Learn to apply steganographic principles using TidalCycles and Haskell.
Add to list
1
Lesons
38 minutes
On-Demand
Free-Video
media.ccc.de
Möglichkeiten der Enttarnung steganographischer Kommunikation im Medium natürlicher Sprachen
0
rewiews
Diskussion über Methoden zur Erkennung versteckter Botschaften in natürlicher Sprache, einschließlich Merkmale, Enttarnungsansätze und Gegenmaßnahmen für klandestine Kommunikation.
Add to list
1
Lesons
44 minutes
On-Demand
Free-Video
DefCamp
When Steganography Stops Being Cool - DefCamp 2015
0
rewiews
Explore steganography's evolution, from classic techniques to modern applications in data science and Android. Learn about hidden data in images, banking malware, and emerging threats.
Add to list
13
Lesons
30 minutes
On-Demand
Free-Video
LASCON
Hiding From Big Brother Using Distributed Steganography
0
rewiews
Learn techniques for hiding data from surveillance using distributed steganography, exploring methods like hidden files, alternate data streams, and encryption combined with steganographic approaches.
Add to list
33
Lesons
42 minutes
On-Demand
Free-Video
Security BSides London
Intelligence Led Penetration Testing
0
rewiews
Explore intelligence-led penetration testing using threat intel and OSINT to create bespoke, realistic assessments that mimic real-world attack techniques and toolkits.
Add to list
8
Lesons
26 minutes
On-Demand
Free-Video
Black Hat
Perfectly Deniable Steganographic Disk Encryption
0
rewiews
Explore self-concealing, deniable encryption techniques similar to VeraCrypt's hidden volume feature, covering design, implementation, and forensic analysis considerations.
Add to list
20
Lesons
50 minutes
On-Demand
Free-Video
Pixel Tracking - How It's Used and Abused
0
rewiews
Explore pixel tracking's uses and misuses, including email tracking, online spying, and data leaks. Learn about protection methods and privacy implications.
Add to list
18
Lesons
47 minutes
On-Demand
Free-Video
0xdade
Anti-Forensics for Fun and Privacy
0
rewiews
Explore anti-forensics techniques to protect your privacy from various threat levels, from casual snooping to nation-state surveillance. Learn practical methods to safeguard your digital footprint.
Add to list
38
Lesons
45 minutes
On-Demand
Free-Video
Black Hat
Hiding In Plain Sight - Advances In Malware Covert Communication Channels
0
rewiews
Explores recent malware techniques using steganography and covert channels to evade detection. Analyzes real-world examples from cybercrime and targeted attacks, detailing implementation and discussing implications.
Add to list
1
Lesons
57 minutes
On-Demand
Free-Video
Black Hat
Exploit Delivery With Steganography and Polyglots
0
rewiews
Explore innovative exploit delivery techniques using steganography and polyglots, focusing on encoding browser exploits in image files for undetectable payload transmission.
Add to list
53
Lesons
58 minutes
On-Demand
Free-Video
Black Hat
Steganography, Steganalysis, & Cryptanalysis
0
rewiews
Explore advanced techniques in hiding, detecting, and decrypting secret information within digital media. Learn cutting-edge methods for secure communication and data protection.
Add to list
1
Lesons
48 minutes
On-Demand
Free-Video
GOTO Conferences
Securing the JVM
0
rewiews
Explore JVM security risks and learn essential techniques for safeguarding Java applications against malicious code execution and data breaches in this eye-opening presentation.
Add to list
23
Lesons
44 minutes
On-Demand
Free-Video
44CON Information Security Conference
Stegosploit - Drive by Browser Exploits Using Only Images
0
rewiews
Innovative technique encoding browser exploits in images, combining steganography and polyglots for undetectable delivery. Explores implementation, challenges, and implications for cybersecurity.
Add to list
47
Lesons
51 minutes
On-Demand
Free-Video
Black Hat
Hiding in the Familiar - Steganography & Vulnerabilities in Pop Archives Formats
0
rewiews
Explore vulnerabilities in common archive formats, revealing steganographic techniques and processing errors that impact security tools and forensic analysis. Includes demonstrations and new tool introduction.
Add to list
1
Lesons
1 hour 11 minutes
On-Demand
Free-Video
Character Assassination Fun and Games with Unicode - Adrian Crenshaw
0
rewiews
Explore Unicode's potential for character obfuscation, homograph attacks, and steganography in cybersecurity. Learn about encoding, browser protections, and real-world implications.
Add to list
36
Lesons
1 hour 3 minutes
On-Demand
Free-Video
When Steganography Stops Being Cool
0
rewiews
Explore the limitations and potential risks of steganography in digital security, examining its effectiveness and vulnerabilities in modern cybersecurity landscapes.
Add to list
1
Lesons
36 minutes
On-Demand
Free-Video
Confreaks
Crypto Steganography: Hidden Messages in Digital Images
0
rewiews
Explore crypto steganography's history, applications, and math through a puzzling series of TV show pictures, leading to an unexpected Olympic curling connection.
Add to list
1
Lesons
29 minutes
On-Demand
Free-Video
Confreaks
Hiding Messages in x86 Programs: A Steganography Trick - !Con 2021
0
rewiews
Discover a unique steganographic technique to hide messages within x86 programs. Explore x86 architecture and learn a clever trick in instruction encoding for covert communication.
Add to list
7
Lesons
11 minutes
On-Demand
Free-Video
x33fcon
Mobile Device Security Threats: Malware Distribution and Corporate Vulnerabilities - Lecture 3
0
rewiews
Explore mobile device security vulnerabilities and malware threats like Pegasus, understanding how personal phones can compromise corporate cybersecurity through various attack vectors and data extraction methods.
Add to list
12
Lesons
35 minutes
On-Demand
Free-Video
nullcon
The World of Spyware for Rent - Nullcon Berlin 2024
0
rewiews
Explore the world of commercial spyware with cybersecurity expert Fred Raynal. Gain insights into the industry, its impact, and the latest developments in this controversial field of digital surveillance.
Add to list
1
Lesons
51 minutes
On-Demand
Free-Video
load more...