Shade LSB 1.0.0 Crack With Activator Latest 2024

Shade is an acronym which stands for Steganographically Hide and Analyze Data Entries. Shade LSB project is a versatile and feature-rich program designed to analyze and manipulate LSB's (least significant bits) of files, attempting to either hide or pluck out data.

Shade LSB is a command line tool that allows you analyze data entries.

Shade LSB

Download Shade LSB Crack

Software developer
Grade 2.9
944 2.9
Downloads count 7776
File size < 1 MB
Systems Windows All

LSB manipulation is a form of steganography, the art or science of making the existence of information undetectable by normal means. This is achieved by writing the contents of a confidential file to the LSBs of another harmless and inconspicuous host file.

Here are some key features of "Shade LSB":

■ perform any payload file type.

■ optionally perform on these known file types:

■ jpeg/jfif - Joint Photographic Experts Group File Interchange Format

■ mpeg - Moving Pictures Experts Group format

■ mp3 - mpeg layer 3 format

■ wav - windows wave file format

■ bmp - windows bitmap format (8 bit)

■ bmp - windows bitmap format (24 bit)

■ png - portable network graphics format

■ gif - graphics interchange format

■ store/acknowledge payload file name in payload data.

■ perform multiple payload files at once.

■ verify integrity of payload data against original payload file.

■ perform payload backwards.

■ input from standard input (eg, perform on piped input)

■ output processed data to standard output or to a file.

■ perform payload between/before/after specified phrase(s) located in host data.n");

■ use 1-8 bits per byte of host data.

■ skip bytes at head of host data.

■ skip bytes at tail of host data.

■ skip X host bytes after performing each one.

■ limit performing of payload to a specific number of bytes.

■ Xor-crypt payload against custom repeating passphrase.

■ Xor-crypt payload against custom repeating bit-sequence.

■ apply arbitrary operations sequencially on each byte of payload file:

■ invert bits. (eg, invert 3,4, 6, and 8: -i 3468)

■ reverse bits. (eg, reverse 3 through 7: -R 37)

■ transpose bits. (eg, swap bits 3 with 4 and 6 with 8: -t 3468)

■ Xor-crypt against custom 8-bit-sequence.