Skip to content
View Odyhibit's full-sized avatar
  • Dallas, TX
Block or Report

Block or report Odyhibit

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Odyhibit/README.md
  • 👋 Hi, I’m Josh Bloom

    Here, you will find my code solutions to problems. Please note not all solutions provided here have corresponding problems.

    For example, you will find my answers to questions like What if XOR was a mathematical operator? Can you use the Bacon cipher to hide messages the same length as the cover text? What would it look like to use Most Significant Bit steganography? How many bits of information can you hide in an image before it becomes noticeable?

    There is a set of scripts that will continuously download new NPM packages and run YARA rules to try and find malicious packages. There is a script that performs a brute force decoding of rail fence ciphers that uses a dictionary of common words.

Pinned Loading

  1. NCLteamDistribution NCLteamDistribution Public

    Use Individual Game Scores to create balanced teams

    Python 5 1

  2. NPMspy NPMspy Public

    Observe new NPM packages, looking for suspicious code.

    Python 3 3

  3. Any-bits-Steganography Any-bits-Steganography Public

    You pick the bits, and what file to hide. Use LSB, MSB, or whatever.

    Python

  4. five_strips_of_bacon five_strips_of_bacon Public

    Using 5 simultaneous bacon ciphers. The hidden message can be the same length as the cover text.

    Python 1 1

  5. FontRecognitionAI FontRecognitionAI Public

    PureBasic