You have downloaded this file 0 times in the last 24 hours, limit is 5.
Your file downloads total 10 in the last 24 hours, limit is 10.

hydan 0.13 (linux)
Sorry, your download limit has been reached

       Hydan steganographically conceals a message into an
       application. It exploits redundancy in the i386 instruction
       set by defining sets of functionally equivalent instructions.
       It then encodes information in machine code by using the
       appropriate instructions from each set.


               - Application filesize remains unchanged
               - Message is blowfish encrypted with a user-supplied
                 passphrase before being embedded
               - Encoding rate: 1/110

       Primary uses for Hydan:

               - Covert Communication: embedding data into binaries
                 creates a covert channel that can be used to
                 exchange secret messages.

               - Signing: a program's cryptographic signature can
                 be embedded into itself. The recipient of the
                 binary can then verify that it has not been
                 tampered with (virus or trojan), and is really
                 from who it claims to be from. This check can be
                 built into the OS for user transparency.

               - Watermarking: a watermark can be embedded to
                 uniquely identify binaries for copyright purposes,
                 or as part of a DRM scheme. Note: this usage is not
                 recommended as Hydan implements fragile watermarks.
Submitted By:
Administrator (admin)
Submitted On:
File Size:
File Version:
File Author:
Rakan El-Khalil
File HomePage:
Click to visit site
Submitted On:
Total Votes:0